Small editors have previously reported some tips that PHP developers are easy to ignore. apart from some technical methods, many nuances are also easy for programmers to ignore, next we will summarize 10 things you may not know about PHP. For more information about PHP, visit: PHP development Basics 1. use the ip2long () and long2ip () functions to set the IP address "> <LINKhref =" http :/
Small editors have previously reported some tips that PHP developers are easy to ignore. apart from some technical methods, many nuances are also easy for programmers to ignore, next we will summarize 10 things you may not know about PHP.
For more information about PHP, visit: PHP development basics
1. use the ip2long () and long2ip () functions to convert the IP address into an integer and store it in the database.
This method reduces the storage space to nearly 1/4 (15 bytes of char (15) to 4 bytes of integer ), it is easier to calculate whether a specific address is on a page in a specific segment, and it accelerates search and sorting (although sometimes only a little faster ).
2. when verifying the Email address, use the checkdnsrr () function to verify whether the domain name exists.
This built-in function can confirm that the specified domain name can be resolved to an IP address. The user comment section of the PHP document for this function has a simple user-defined function, which is based on checkdnsrr () to verify the legitimacy of the email address. For those who think their e-mail addresses are memory@wwwphp100.net rather than memory@php100.net, this method can easily catch them.
3. if you are using PHP 5 and MySQL 4.1 or later, use the mysqli _ * series functions.
A good feature is that you can use preprocessing statements. if you are maintaining a database-intensive site, this feature can speed up the query. Some evaluation scores.
4. learn to fall in love with ternary operators.
5. if you feel reusable parts in the project, check whether PEAR already exists before writing a line of code.
Many PHP programmers know that PEAR is a good resource library, although many programmers do not know. This online resource library contains more than 400 reusable program fragments that you can immediately use in your program. Unless your project is really special, you can always find the PEAR package that helps you save time.
6. use highlight_file () to automatically print the beautifully formatted source code.
If you seek help from a script on the message board or IRC, this function is very handy. Of course, be careful not to accidentally disclose your database connection information and password.
7. use the error_reporting (0) function to prevent users from seeing potential sensitive error messages.
Ideally, the publishing server should be completely disabled in php. ini. However, if you are using a shared web server, you do not have your own php. ini file. in this case, you 'd better choose to add error_reporting (0) before the first line of all scripts (or use the require_once () method ). This completely blocks sensitive SQL query statements and path names when an error occurs.
8. before storing large strings in the database, use gzcompress () and gzuncompress () to explicitly compress/decompress the strings.
This PHP built-in function uses the gzip algorithm to compress common text by up to 90%. These functions are used every time I want to read and write BLOB fields. The only exception is when I need full-text retrieval.
9. multiple return values are obtained from a function using the "reference" parameter passing method.
Like the ternary operator, most programmers who have been formally trained in programming know this technique. However, programmers whose HTML background is greater than the Pascal background have more or less such questions: "How many values can be returned from a function when only one return can be used ?" The answer is to add the "&" symbol before the variable and pass it through "reference" instead of "value.
10. fully understand the risks of "magic quotes" and SQL injection.
I hope all the developers here will be familiar with SQL injection. However, I still put this article here because it is hard to understand.