Tag: PHP Source Code

Connect to sFTP Server in PHP

To use SFTP within your PHP application, a series of fundamental steps need to be executed. First and foremost, you must establish a connection to the SFTP server by utilizing the ssh2 extension, which facilitates secure communication. Subsequently, authentication is crucial to ensure the identity of the connecting entity. This is achieved by providing valid credentials, including a username and password, to the SFTP server. Once authenticated, your PHP script gains access to the server and enables file-related operations such as listing directory contents, downloading files to the local environment, and uploading files to the remote server.

Read More

Search the LDAP Directory in PHP

This PHP code connects to an LDAP server, performs a search for entries with the last name and then sorts and prints them alphabetically. The sorting is done by a custom function called compareEntry, which compares entries based on last names and first names. It uses the LDAP functions to communicate with the server and showcases basic error handling.

Read More

Get Detailed Server Information in PHP

Welcome to the PHP Server Information Script – a robust script designed to provide valuable insights into your server environment. This script offers a overview of key aspects such as PHP memory usage, system memory details, and OS/Web Server information.

Read More

PHP/MySQL Database Table Structure Viewer

The script uses MySQLi, a modern and more secure extension for interacting with MySQL databases in PHP. It provides a beginner-friendly way to understand the composition of your database tables. The script connects to the database, query the structure of a specific table and presents the information in an organized HTML format.

Read More

Block a Specific IP Address in PHP

In this article, we’ll explore how to block a specific IP address or a list of addresses from accessing a webpage using PHP. By leveraging PHP’s capabilities, you can fortify your web applications against unauthorized access and potential security threats. Let’s delve into the process of implementing IP-based access restrictions to bolster the security of your PHP-powered webpages.

Read More