Tuesday, July 22, 2014
Text Size

301 Redirect using htaccess file

There are a lot of articles & posts out there that cover the same topic, but as this took me the good part of an hour just to find out, I'm posting it here so I never have to look for it again.

A client changed their website domain address and wanted any person visiting the old domain to be redirected to the new domain.

I warned that a 301 site gets removed from the Google directory and true to form Google have removed it. Not sure why nobody believed me when I raised the alarm but hey-ho.

I'm going to show you how to do this with a .htaccess file:

htaccess Rewrites SEF URL and submits to PHP

A quick note on a htaccess rewrite rule I'm liking.

What does it do?
What I type:

  1.  http://www.mywebsite.com/blog/videos.html 
Sends this to server:

  1.  http://www.mywebsite.com/index.php?myFolder=blog&myFiles=videos 

A picture of the Internet

Just a pretty picture on how hackers have created an infographic of the internet:

Infographic of the Internet

Source: BitBucket.Org - Internet Census 2012

Code Troubleshooting Checklist

So I've started this list to make sure I don't spend so long anymore on debugging code. The aim of this article is to quickly suggest ways of pinpointing the source of the problem:

Basic Tests for SQL-Injection Vulnerabilities

I'm putting this article here so that I can run through a checklist when I am adding an input field to an interface.

There is a strange complacency in many applications released for public use which are vulnerable to SQL Injection. According to industry reports over 60% of attacks on websites is through SQL-Injection alone.

SQL-Injection is not as complicated as it is made out. An input field in a website form is where the hacker can add code that is submitted to the website and processed by the hosting server. Take a search engine for instance, this is a field which the end-user can freely enter any text they want, especially any code. The Google Search Engine has undergone a lot of work to prevent people from injecting code into their search function. But a search engine is just one example, on your website, you need to test EVERY input field the end-user can access. For an introduction on SQL-Injection, please read my article "Anti-SQL Injection Basics".


Latest Posts

  • Joes Quicklist Weblinks (JQW)

    • Thu 17-Jul-14
      Hi, thanks a lot. But I have got a problem with download it. Error: "File could not be found Important!
    • Tue 15-Jul-14
      Hi Artur, I forgot to get back to you sooner. I was going to include a set of instructions to do this ...
    • Mon 14-Jul-14
      Hi Skarosg, Not sure if we took this to e-mail but I noticed your site is displaying the images now.
    • Fri 11-Jul-14
      Hi, How can I put user name and category of weblink in module, near the date? Thanks..
  • Joes Word Cloud (JWC)

    • Tue 17-Jun-14
      I'm using JE 3.1.19 stable.