Posts by Tag

sysadmin

MySQL 5.7 and Wordpress problem

less than 1 minute read

If you upgrade to MySQL 5.7, you may encounter bugs with legacy software. Wordpress, which I also consider some kind of legacy software, does not handle this...

Run a script with lowest priority

less than 1 minute read

When doing low-priority tasks like backups are fixing permissions on a cronjob, it is a good idea to modify the niceness of the script. By using ionice and r...

Varnish 3 configuration

6 minute read

Shared caches are pretty strict when it comes to caching or not a request. This is good, otherwise it would cache requests that are not meant to be cached.

Simple templating system using Bash

1 minute read

I often have to deploy several config files that are very similar. Things like Apache VirtualHost and PHP FPM pools. The solution to this kind of problem is ...

Verifying DNS propagation

2 minute read

When changing DNS settings, the propagation can take from 15 minutes to two days. Clients and bosses are usually not very fond of this principle so it is oft...

Back to Top ↑

PHP

PHP Document Root, Path and URL detection

1 minute read

PHP has no built-in base URL variable. In all the mess that is the $_SERVER variable, there is nothing that will tell you the base URL for your website.  Thi...

Track your time working on PHP projects

7 minute read

Have you ever had a project manager? You know, the kind of person that comes to bug you about your timesheet not being properly done and how important it is?...

Generate Lorem Ipsum using loripsum.net API

less than 1 minute read

loripsum.net describes itself as “The ‘lorem ipsum’ generator that doesn’t suck”. It is the same text you are used to see over and over except that it is dec...

bcrypt with ircmaxell and how to use it

1 minute read

It is common knowledge that md5 is not secure for password hashing. It is almost worst than plaintext because it may falsly induce the impression of security...

PHP Coding standards

1 minute read

For more than a year, some influent PHP programmers of the most active of the most active projects in the community have been working on coding standards.

Validating emails using SMTP queries

2 minute read

Email validation are traditionally done in three flavors. They have pros and cons but they are widely spread; let us go through them.

Back to Top ↑

Bash

Run a script with lowest priority

less than 1 minute read

When doing low-priority tasks like backups are fixing permissions on a cronjob, it is a good idea to modify the niceness of the script. By using ionice and r...

Simple templating system using Bash

1 minute read

I often have to deploy several config files that are very similar. Things like Apache VirtualHost and PHP FPM pools. The solution to this kind of problem is ...

Back to Top ↑

Symfony2

Tips for an efficient interview

2 minute read

I have only been in the Web industry for 5-6 years but I am already a bit sceptical when giving an interview. Some people are so good at talking about stuff ...

bcrypt with ircmaxell and how to use it

1 minute read

It is common knowledge that md5 is not secure for password hashing. It is almost worst than plaintext because it may falsly induce the impression of security...

Back to Top ↑

Apache

PHP Document Root, Path and URL detection

1 minute read

PHP has no built-in base URL variable. In all the mess that is the $_SERVER variable, there is nothing that will tell you the base URL for your website.  Thi...

Back to Top ↑

CSS

Responsive menu in pure CSS

3 minute read

Having menus that gracefully adapt to the size of your screen can be troublesome. Inspired by the collapsible menu of Bootstrap, here is a pure CSS implement...

WebPlatform.org – When giants get together

less than 1 minute read

Starting to build websites can be very hard, keeping up with the technology is a must and building cross-browsers is a daily crisis. A lot of great resources...

Back to Top ↑

MySQL

MySQL 5.7 and Wordpress problem

less than 1 minute read

If you upgrade to MySQL 5.7, you may encounter bugs with legacy software. Wordpress, which I also consider some kind of legacy software, does not handle this...

Back to Top ↑

Wordpress

MySQL 5.7 and Wordpress problem

less than 1 minute read

If you upgrade to MySQL 5.7, you may encounter bugs with legacy software. Wordpress, which I also consider some kind of legacy software, does not handle this...

bcrypt with ircmaxell and how to use it

1 minute read

It is common knowledge that md5 is not secure for password hashing. It is almost worst than plaintext because it may falsly induce the impression of security...

Back to Top ↑

Performance

Back to Top ↑

hosting

MySQL 5.7 and Wordpress problem

less than 1 minute read

If you upgrade to MySQL 5.7, you may encounter bugs with legacy software. Wordpress, which I also consider some kind of legacy software, does not handle this...

Back to Top ↑

Development tool

Track your time working on PHP projects

7 minute read

Have you ever had a project manager? You know, the kind of person that comes to bug you about your timesheet not being properly done and how important it is?...

Back to Top ↑

Nginx

Back to Top ↑

Javascript

Testing your Regex skills

less than 1 minute read

Regular expressions are powerful, yes. They should not be used for everything, especially not HTML. HTML is not a regular language. As soon as you need some ...

Back to Top ↑

Caching

Back to Top ↑

GitHub

Simple templating system using Bash

1 minute read

I often have to deploy several config files that are very similar. Things like Apache VirtualHost and PHP FPM pools. The solution to this kind of problem is ...

Back to Top ↑

Interesting

Back to Top ↑

VPS

Back to Top ↑

Drupal

bcrypt with ircmaxell and how to use it

1 minute read

It is common knowledge that md5 is not secure for password hashing. It is almost worst than plaintext because it may falsly induce the impression of security...

Back to Top ↑

Varnish

Varnish 3 configuration

6 minute read

Shared caches are pretty strict when it comes to caching or not a request. This is good, otherwise it would cache requests that are not meant to be cached.

Back to Top ↑

Linux

Back to Top ↑

Doctrine

Back to Top ↑

Email

Validating emails using SMTP queries

2 minute read

Email validation are traditionally done in three flavors. They have pros and cons but they are widely spread; let us go through them.

Back to Top ↑

Regex

Testing your Regex skills

less than 1 minute read

Regular expressions are powerful, yes. They should not be used for everything, especially not HTML. HTML is not a regular language. As soon as you need some ...

Validating emails using SMTP queries

2 minute read

Email validation are traditionally done in three flavors. They have pros and cons but they are widely spread; let us go through them.

Back to Top ↑

mod_rewrite

Back to Top ↑

Cleanup

PHP Coding standards

1 minute read

For more than a year, some influent PHP programmers of the most active of the most active projects in the community have been working on coding standards.

Back to Top ↑

Computer Science

Back to Top ↑

Meta

Track your time working on PHP projects

7 minute read

Have you ever had a project manager? You know, the kind of person that comes to bug you about your timesheet not being properly done and how important it is?...

Going further

1 minute read

So, 4 years and a half after having started my bachelor degree at the University of Montreal in Computer Science, I am done. It has been a long and painful p...

Back to Top ↑

HTML

Responsive menu in pure CSS

3 minute read

Having menus that gracefully adapt to the size of your screen can be troublesome. Inspired by the collapsible menu of Bootstrap, here is a pure CSS implement...

WebPlatform.org – When giants get together

less than 1 minute read

Starting to build websites can be very hard, keeping up with the technology is a must and building cross-browsers is a daily crisis. A lot of great resources...

Back to Top ↑

Git

Back to Top ↑

Security

bcrypt with ircmaxell and how to use it

1 minute read

It is common knowledge that md5 is not secure for password hashing. It is almost worst than plaintext because it may falsly induce the impression of security...

Back to Top ↑

jQuery

Back to Top ↑

CDN

Back to Top ↑

Twitter Bootstrap

Back to Top ↑

Data Fixtures

Generate Lorem Ipsum using loripsum.net API

less than 1 minute read

loripsum.net describes itself as “The ‘lorem ipsum’ generator that doesn’t suck”. It is the same text you are used to see over and over except that it is dec...

Back to Top ↑

Management

Tips for an efficient interview

2 minute read

I have only been in the Web industry for 5-6 years but I am already a bit sceptical when giving an interview. Some people are so good at talking about stuff ...

Track your time working on PHP projects

7 minute read

Have you ever had a project manager? You know, the kind of person that comes to bug you about your timesheet not being properly done and how important it is?...

Back to Top ↑

Guide

Back to Top ↑

Ubuntu

Back to Top ↑

Percona

Back to Top ↑

Linode

Back to Top ↑

Filesystem

Back to Top ↑

GlusterFS

Back to Top ↑

SMTP

Validating emails using SMTP queries

2 minute read

Email validation are traditionally done in three flavors. They have pros and cons but they are widely spread; let us go through them.

Back to Top ↑

PHPUnit

Back to Top ↑

SwiftMailer

Back to Top ↑

.htaccess

Back to Top ↑

bashrc

Back to Top ↑

Advertising

Back to Top ↑

Social Media

Back to Top ↑

PHP-FIG

PHP Coding standards

1 minute read

For more than a year, some influent PHP programmers of the most active of the most active projects in the community have been working on coding standards.

Back to Top ↑

PSR

PHP Coding standards

1 minute read

For more than a year, some influent PHP programmers of the most active of the most active projects in the community have been working on coding standards.

Back to Top ↑

UdeM

Back to Top ↑

Oracle

Back to Top ↑

PostgreSQL

Back to Top ↑

Opensource

Back to Top ↑

VPN

Back to Top ↑

Proxy

Back to Top ↑

ElasticSearch

Back to Top ↑

Mime-Type

Back to Top ↑

iptables

Back to Top ↑

UFW

Back to Top ↑

Documentation

WebPlatform.org – When giants get together

less than 1 minute read

Starting to build websites can be very hard, keeping up with the technology is a must and building cross-browsers is a daily crisis. A lot of great resources...

Back to Top ↑

DNS

Verifying DNS propagation

2 minute read

When changing DNS settings, the propagation can take from 15 minutes to two days. Clients and bosses are usually not very fond of this principle so it is oft...

Back to Top ↑

bcrypt

bcrypt with ircmaxell and how to use it

1 minute read

It is common knowledge that md5 is not secure for password hashing. It is almost worst than plaintext because it may falsly induce the impression of security...

Back to Top ↑

jQuery plugin

Back to Top ↑

Frontend

Back to Top ↑

Retina

Back to Top ↑

Imagemagick

Back to Top ↑

favicon

Back to Top ↑

LESS

Back to Top ↑

Lorem Ipsum

Generate Lorem Ipsum using loripsum.net API

less than 1 minute read

loripsum.net describes itself as “The ‘lorem ipsum’ generator that doesn’t suck”. It is the same text you are used to see over and over except that it is dec...

Back to Top ↑

Session

Back to Top ↑

Google Analytics

Varnish 3 configuration

6 minute read

Shared caches are pretty strict when it comes to caching or not a request. This is good, otherwise it would cache requests that are not meant to be cached.

Back to Top ↑

router

Back to Top ↑

networking

Back to Top ↑

backup

Run a script with lowest priority

less than 1 minute read

When doing low-priority tasks like backups are fixing permissions on a cronjob, it is a good idea to modify the niceness of the script. By using ionice and r...

Back to Top ↑

inotify

Back to Top ↑

acl

Back to Top ↑

Puppet

Back to Top ↑

Time tracking

Track your time working on PHP projects

7 minute read

Have you ever had a project manager? You know, the kind of person that comes to bug you about your timesheet not being properly done and how important it is?...

Back to Top ↑

Replication

Back to Top ↑

LAMP

Back to Top ↑

cluster

Back to Top ↑

NFS

Back to Top ↑

Csync2

Back to Top ↑

Lustre

Back to Top ↑

DRBD

Back to Top ↑

MySQL Triggers

Back to Top ↑

MyISAM

Back to Top ↑

InnoDB

Back to Top ↑

ESI

Back to Top ↑

Composer

Back to Top ↑

Packagist

Back to Top ↑

Gitlab

Back to Top ↑

Interview

Tips for an efficient interview

2 minute read

I have only been in the Web industry for 5-6 years but I am already a bit sceptical when giving an interview. Some people are so good at talking about stuff ...

Back to Top ↑

Responsive

Responsive menu in pure CSS

3 minute read

Having menus that gracefully adapt to the size of your screen can be troublesome. Inspired by the collapsible menu of Bootstrap, here is a pure CSS implement...

Back to Top ↑

Optimization

Back to Top ↑

Bitcoin

Is Bitcoin mining profitable ?

3 minute read

I thought I would go for a change and talk about some Bitcoin mining. There have been some big hype around it. Some large companies are making top dollar wit...

Back to Top ↑

tutorial

Back to Top ↑

codepen

Back to Top ↑

checkbox

Back to Top ↑

UTF-8

Back to Top ↑

VMWare

Back to Top ↑

Vagrant

Back to Top ↑

FOSUserBundle

Back to Top ↑

Mongo

Back to Top ↑