Web Niraj
  • Facebook
  • Flickr
  • Github
  • Linkedin
  • Twitter
  • YouTube
Online portfolio, code examples and developer blog
  • About
  • Contact
  • Portfolio
  • WordPress
Search the site...
  • Home
  • Blog

Blog

Review: Amazon Echo Buds

0

I’ve owned the Amazon Echo Buds wireless headphones for over a year now, since they were first made available in the UK. And while the headphones have served me well for the past 12 months, I’ve had several issues that has left me overall disappointed with the product.

Read More

Amazon, Gadget, Review

Review: RhinoKey Titanium EDC Multitool

1

I was a backer of the RhinoKey EDC tool on Kickstarter, but it was a big mistake. If you are thinking of buying one as a gift (or for yourself), avoid this particular brand and get yourself a SmartKey or something else instead.

Read More

EDC, Gadget, Review, RhinoKey

Hardening Apache Using Security Configuration

2

When setting up a new Apache server to run your application, it’s always a good idea to setup some initial security settings as part of the process. Luckily, Apache comes with a default security.conf file that can be enabled and updated to add basic hardening to your server.

Read More

Apache, Hardening, Security

Reporting cPanel cPHulk IPs to Abuse IP DB

2

But did you know that you can configure cPanel, and specifically cPHulk Brute Force Protection to automatically report abusive IPs to the IPAbuse database.

Read More

Brute Force, cPanel / WHM, cPHulk, Security

3 Tools to Help Secure Your Server or Website

0

In a recent project, I’ve been liaising with web security experts to carry out security testing on a number of client servers. During my research, I’ve come across various free tools that can help you identify any potential issues.

Read More

Penetration Testing, Security, Server Configuration, SSL

Auto-Reporting LFD Block Reports to Abuse IP DB v2

6

Due to popular demand, I have upgraded my initial LFD reporting script to use the IP Abuse DB v2 APIs. This post covers the new script and how it can be used. Please read my previous post to understand the background of the script.

Read More

Firewall, Hacking, IP Abuse, Security

Creating Symlinks to Libraries in Composer

0

When developing a new library in PHP, it’s sometimes useful to symlink the library into a project while you work on it. Find out how to update your Composer config to achieve this.

Read More

Composer, Development, PHP, Tutorial

Auto-Reporting LFD Block Reports to Abuse IP DB

12

I created a PHP script that would allow the CSF / LFD firewall plugin on my server to report IPs that brute-force logins or port scan my server to the AbuseIPDB website. This tutorial shows how I achieved this.

Read More

Firewall, Hacking, IP Abuse, Security

Making Ajax Calls Sequentially using jQuery

6

In a recent project, there was a need to make ajax calls to a remote server in a sequential manner to synchronise data. Each call would wait for the previous one to complete, before triggering the next one. See the code here.

Read More

Ajax, JavaScript, jQuery, Tutorial

Dynamically Adding Passwords to PDFs using PHP

0

In a recent project, I was asked to modify uploaded PDFs to dynamically insert a user specified password to keep files secure. This tutorial shows you how this can be achieved using PDF libraries from Setasign.

Read More

PDF, PHP, Security, Tutorial
123›»

StackExchange / StackOverflow

profile for Niraj Shah on Stack Exchange, a network of free, community-driven Q&A sites

PSN Profile

Tags

Amazon Web Services Android Android 4.4 KitKat Android 5.0 Lollipop Apache API Application Backup Bug Command Line Cordova Example Facebook Facebook Graph API Facebook PHP SDK 4.0 Facebook Social Plugins Fan Page Flash Geolocation Google Nexus 5 Google Nexus One Hacking HTML5 Image Manipulation iOS iPhone JavaScript jQuery Laravel 5 Linux NodeJS Parse PDF PHP Plugin Portfolio Review Security Server SSH SSL Sysadmin Tutorial WordPress WordPress Plugins
© 2011-2022 Niraj Shah
  • Blog
  • Portfolio
  • WordPress
  • About Me
  • Contact Me
  • Privacy Policy
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Privacy Policy