-
Recent Posts
Recent Comments
- fisharebest on Exodus – Leaving GEDCOM behind…
- Wes Groleau on Exodus – Leaving GEDCOM behind…
- fisharebest on Exodus – Leaving GEDCOM behind…
- Stephen Arnold on Exodus – Leaving GEDCOM behind…
- fisharebest on Genesis – In the beginning was GEDCOM…
Archives
Categories
Meta
Monthly Archives: July 2010
MySQL Cursor Loops – the easy way
If you want to use a cursor, you are going to need a loop. All the examples on the MySQL website are a bit convoluted, have unnecessary flags and checks. This is a better way to do it:
Genesis – In the beginning was GEDCOM…
If you are familiar with genealogy, then you will almost certainly have come across GEDCOM file “formats”. I put the word in quotation marks because not only are there many versions of the format, every vendor has customised it to … Continue reading
Security through obscurity
Security through obscurity can be a good thing – if it is part of a multi-layered approach to security. Consider the following entries in my apache error log: [Tue Jul 06 08:52:44 2010] [error] [client 208.71.173.74] File does not exist: … Continue reading