• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Internet
    • Browsers
    • Cloud Computing
    • Online Video
    • Search Engines
    • Web 2.0
  • Mobile
    • Android Apps
    • Apps
  • Software
  • Funny Stuff
  • Social Networks
  • Web Tools

Daily Bits

  • Home
  • About
  • Archives
  • Contact
  • Advertise

Getting Started with PHP: Part 3 – Program Control Structures

December 10, 2007 by Brandon 11 Comments

In the last part of this series, we learned about using variables in PHP. Today, we will learn about using program control structures, such as if/else blocks and for/while loops. There are a number of other control structures, but these are the most common, and can accomplish everything that the other ones can.

Conditional Execution Using an If/Else Block

There are many circumstances where we would want to execute a certain block of code only if some other condition were true. In times like this, we want to make use of an if/else block. Let’s see how we could use this method to display one message for all visitors that came from digg, and a different message for everyone else:

<?php
if (stristr($_SERVER["HTTP_REFERER"], "http://digg.com") === TRUE) {
  echo "Greetings digg users!";
}
else {
  echo "Welcome to my website!";
}
?>

Let’s take a closer look at exactly what is going on here. $_SERVER[“HTTP_REFERER”] is a built-in server variable that contains the referring website, if there is one. The function stristr searches for one string within another string. In this case, we are searching for “http://digg.com” within the referrer contained in $_SERVER[“HTTP_REFERER”]. If “http://digg.com” is found within the referrer string, then stristr will return TRUE, so this is the condition that we check for in our if statement. The code that we want to execute when this occurs follows the if statement, contained within curly braces {}. If the statement evaluates to FALSE, then the code that follows our else statement will be executed (also contained within curly braces). If we had not wanted to display a default message, we could have simply left off the else statement altogether.

If we had multiple conditions to test, we could have used the elseif statement. Let’s look at a simple example of how this could be used:

<?php
$gradePercent = 75;
if ($gradePercent > 90) {
  echo "You got an A!";
}
elseif ($gradePercent > 80) {
  echo "You got a B!";
}
elseif ($gradePercent > 70) {
  echo "You got a C!";
}
elseif ($gradePercent > 60) {
  echo "You got a D!";
}
else {
  echo "You got an F!";
}
?>

Using For/While Loops

On some occasions, you will need to loop through a list of values – to list your 5 most recent blog posts, for example. You have several different choices of loops to use, depending on your exact situation. The 2 most popular loop structures that I will cover are for and while loops. The while loop is a bit simpler, so I will cover that one first:

<?php
$count = 1;
while ($count <= 10) {
  echo "$count ";
  $count++;
}
?>

The conditional statement in the while loop says that the loop will be executed as long as $count is less than or equal to 10. Inside of the loop, we just print out the current value of our variable $count, and then increment $count by 1 ($count++ is a shorthand statement that is equivalent to $count = $count + 1). Note that all the steps we want to perform inside of our loop are contained within curly braces, just as we did with the if/else statements above. The result of this loop would be to print the numbers 1 through 10 on the screen.

Now let’s take a look at how we would do the same thing with a for loop:

<?php
for ($count = 1; $count <= 10; $count++) {
  echo "$count ";
}
?>

You will notice that the for statement is a bit more complicated than the while loop, but it also does a lot more for us. There are 3 parts that must be included in a for statement, separated by semi-colons: the first initializes our loop counter, the 2nd is the exit condition, and the 3rd increments the loop counter after each pass through the loop. One reason I like the for loop is that it forces me to remember to increment the loop counter, whereas the while loop does not. If you forget to increment the loop counter, the exit condition will never be satisfied, resulting in an infinite loop!

For Next Time

Now that you have learned about using if/else blocks and for/while loops, you can really start to write some interesting programs in PHP. For the next part in this series, I would love to get some feedback on what you’d like to hear about next. Do you want to learn about creating your own functions, or how about database access? I’m wide open to suggestions, so leave ’em here in the comments, and tell me what you’d like to learn about next.

You can already read Getting Started with PHP: Part 4 – Integrating PHP and HTML.

Filed Under: General Tagged With: control, getting started, php, program, structure

How Fast Do You Type?

December 8, 2007 by Admin 9 Comments

Do you think you type faster than the average person? Now you can test it out. 10-Fast-Fingers Speedtest is a simple web tool that tests how fast you type. You will be presented with some words and a form to type them. The objective is to type as many correct words as possible within 60 seconds.

speedtesttype.jpg

My record so far is 359 points, which translates into 476 characters per minute. It is not bad, but I am a two-fingers typist, and I am pretty sure I could improve that rate if I learned to touch type (where you use all the fingers).

Apparently the goal of the creators of this tool was to promote their touch typing online course in fact. They have some interactive lessons and tests that are supposed to get you started with touch typing. I am going through it right now, so I will keep you guys updated if my typing speed increases.

Filed Under: Web Tools Tagged With: speed, test, touch, type, web tool

What is Phishing? An Introduction

December 7, 2007 by Loki 9 Comments

whatisphishing.jpg

The Internet is a vast world, so vast that it somehow is an existence similar to our real world: IP addresses for home addresses, e-mails for snail mails, even calling-enabled messengers for telephones and mobile phones. But a world is not a complete world without its prevailing crimes, right? If so, which crime is as widespread in the Internet as robbery is to the real world? It’s phishing.

Phishing is an act of illegally acquiring sensitive information, like usernames and passwords, from an unsuspecting user. Like fishing, the word it originated from where you use worms as bait to catch fishes, of course, phishing uses trustworthy websites (usually the online transaction types like e-bay and PayPal), e-mails, and online messengers for bait to catch unaware users and get sensitive information from them. But unlike computer viruses, which attack the computer’s internals, phishing deals a more serious damage in a personal, commonly financial level.

There are numerous ways for malicious Internet connoisseurs to phish out sensitive information. People who depend on Internet-based transactions should be wary of these phishing techniques that we will discuss next.

Link Manipulation

The most common of all phishing techniques in existence is link manipulation which, as the name states, directs your browser to a website different from the original website you are to visit through fiddled links. Link manipulation usually comes in the form of an e-mail message from what you think is your trustworthy website. Let’s look at a scenario that shows how link manipulation works.

You are checking your e-mail account when suddenly you receive a notice telling you to protect your PayPal account. As you click on the e-mail message link, you read through a seemingly original PayPal message, telling you that PayPal administrators have “noticed” that you attempted to log in using a foreign IP address (a clever alibi, I must say). In the middle of the baffling message appears a highlighted sentence telling you to verify your account, followed by the manipulated link. And after that, a frightening message appears: “If you choose to ignore our request, you leave us no choice but to temporarily suspend your account.” That really leaves you no choice but to follow their manipulated link. Since you cannot afford to temporarily lose access to your virtual bank account, you clicked on the link, which opened the website created by the phisher. On the webpage, you are asked to enter your username and password to “log in” to your account. Thinking that you are furthering the security of your PayPal account, you provided the username and password, et voila! The phisher now knows your username and password and can eventually use them for his gain!

Often, such spoof websites have very minute differences from the original so the link can go unnoticed from a careless eye. Phishers use subdomains in order for their spoof link to keep a reference to the spoofed website, without really connecting to it. Also, phishers trick their victims by using deceiving anchor texts, words or phrases that stand for a link in a website. Through it, the spoof website looks legitimate since the anchor texts act as cover for the phishing link. And on a more complicated note, phishers can also use redirectors of Uniform Resource Locators or URLs to hide their phishing links behind trustworthy websites and domains.

What if you installed an anti-phishing filter to detect phony text contents of e-mail messages and web pages? Think you are safe enough? Think again. Phishers have seen through this, and their methods evolved from phony, plain text messages sent via e-mail providers. Filter evasion methods include using other web objects like images to avoid their manipulated links from being detected by filters.

Website Forgery

Phishers can also use fake web pages to phish out information. This method is known as website forgery, which comes in two devilishly wise packages.

The first method of website forgery uses scripting methods to conceal the manipulated link in the web page’s address bar. Commonly, phishers imitate the address bar logos of trustworthy websites and put them beside URLs of their deceiving website. Further, the phisher’s scripts can even close the address bar containing the phisher’s link, replacing it with an address bar containing the genuine URL to obscure the website’s identity.

The second method of website forgery is done through exploitation of a website’s flaws. Cross-site scripting or XSS uses a website’s programming defects to trick an unsuspecting visitor. XSS is a very convincing phishing technique, because what it does is open the authentic website wherein the victim fills up forms for usernames, passwords, and other confidential information. But upon submitting the page, XSS scripts start working, linking you, the persuaded victim, away from the authentic website and into the phisher’s own. Sometimes, the phisher wouldn’t even need their own websites, for their script is enough for the deception to occur. Such phishing attack is difficult to detect just by merely “looking around” the website. Without prior knowledge on scripting and the like, you will never know what hit you, or in this case, you’ll never notice that you got robbed virtually.

This case is turned from bad to worse by the fact that there exist phishing kits, programs with user interfaces that allow reproduction of websites and creation of their fake versions. Such kits are often used by script kiddies—malicious but amateur programmers who cannot develop their own set of wicked programs, using programs that other malicious programmers like hackers developed. Man-in-the-Middle is one example of phishing kits that enables despicable pseudo businessmen to “mediate” between legitimate online businesses and their clients. Man-in-the-Middle channels information from a business website to a fraudulent website and vice versa in order for the amateur phishers behind the crime to communicate with their victims. Through this, the crime perpetrator can easily capture the victim’s confidential information in real-time setting. This technique spreads phishing to the not-so-knowledgeable script kiddies to build a growing network of virtual criminals. Also, the kit was so flexible that it can be customized based on what type of online business the script kiddie criminal wants to target. Further, the fake website can easily interfere through the transactions between the original website and the victim by “importing” from the target website the victim’s sent information, meaning all credentials of the victim can be viewed and acquired by the phisher. Fortunately, the said phishing kit was discovered by the anti-fraud division of an American software and systems manufacturer.

Other Techniques

Internet frauds don’t only involve websites. When you receive an e-mail message telling you to dial a certain number, doubt it immediately (unless you are expecting some transactions from the website, of course). This might be a voice phishing attack. If you dial the number provided by the phisher in the e-mail message, voice prompts will be asking you to press numeric information about your bank account like your account and PIN number. Phishers have arrays of faking techniques to employ to fool users. They can use fake caller ids to give the call a legitimate, trustworthy feel, an IP service that provides voice-overs to communicate with you in real-time setting, and even access on information keyed through a landline phone.

Although there are anti-phishing toolbars that check websites if they are one of the identified spoof websites in an Internet-wide database, phishers have found a way to further conceal their identity from anti-phishing programs which evolved from mere filter evasion. Introducing: the phlashing technique.

Confident that the anti-phishing programs are the ultimate salvation from phishers, users get that false security feeling that they are protected from any kind of phishing attack. Sadly, phishers were able to think outside the box (or the four corners of the webpage window) and learned to use Macromedia Flash animations as means to create their spoof websites. Such knowledge, in essence, defeats the purpose of anti-phishing services “with the phisher’s hands tied behind his back.” Since anti-phishing programs scan only the text contents of a suspicious website, phlashes can just pass the anti-phishers with flying colors.

As the phishing activities evolved, cyber criminals developed their wicked craft even more, anticipating possible reactions from the security militia of the Internet. Phishers even entered the world of compressed files to easily spread chaos among networks of banks and online transactions. Developing a somewhat plug-and-play phishing network using zipped files on hacked networks, web cons enjoy a phishing spree just by unzipping certain files in a subdirectory of an exploited website. Falsely becoming part of the target website, the unzipped spoof files inside the website’s subdirectories will look just as legit as the directories above it.

Social Network Phishing

Although this only comprises a small percentage of phishing activities, social network phishing is just as grave as its ancestors in the sense that it attacks major groups of web users at once through online community websites. In here, a phisher targets a certain social network like MySpace or LiveJournal, planting in those websites some botnets, automatic and autonomous programs run remotely by a hacker. Although there isn’t much money involved in social networks, phishers still consider them their pot of gold as it is very easy for them to spread key loggers, programs that can capture every keystroke of the user. Phishers use such networks in order to hopefully capture a home computer that is often used to shop online or store money via online banks. Further, most of the people in social networks use the same password for any and almost every account they have in the Internet universe, including their e-mail addresses where most confirmation messages for online transactions are stored. That and the fact that key loggers can acquire passwords are enough warnings for amateur people who use the web for transactions. Other typical social networks that phishers target are bulletins, forums, commentary, and profile websites.

There is another form of phishing that attacks big groups instead of just a single person, and that technique is known as spear phishing. In terms of attack deployment, spear phishing somehow resembles the exact opposite of social network phishing because the former uses somebody from the organization to set up the attack, as compared to the latter, which uses a community website to attack individual users.

Spear phishers actually need three things in order to execute an attack to an organization: (1) an identity of somebody within the organization, preferably a person with high authority to make the attack convincing, (2) wide knowledge about the company’s transactions and daily activities to back up the validity of the phish, and (3) a seemingly valid and well-researched reason for requesting confidential data like the PayPal account of one of the company’s departments. If these three are already available to the phisher, then the spear phishing comes to actuality, as described below.

In spear phishing, after finding a website suitable for the attack, the phisher acts as if he is a member of the website’s company with a position of authority. This step utilizes the first of the three requirements to conceal his identity and at the same time, be more convincing when he would be sending requests for confidential information. However, before he creates the fraud e-mails, he has to first look for traces of financial and confidential information, which he can use to further infiltrate the company, supporting the validity of his next move. In that step, he utilizes the second requirement. And lastly, the crime perpetrator then drafts the e-mail message directed to the company, using as reason the third requirement, in order for the phishing to take place.

The typical information that the spear phisher requests in his fraud e-mail message are the same as any kind of phisher would ask: usernames, passwords, account numbers, and the like. But furthering the attack, the spear phisher provides a manipulated link that, once clicked, will download a malicious program into the computer of the victim.

Phishing is as varied as robbing is in the real world. And with the many techniques above, with some even requiring phishers to study and improve the technique, I can’t help but wonder what the driving force for a phisher to phish is. Let’s explore a phisher’s mind in the next section.

A Net Full of Phishes

Everyday, an average of 10 phishing attacks are developed to dupe varying online transactions. However, in this constant increase, the concern of people is more directed to stopping phishers by putting up layers and layers of phishing security programs. Fortunately, I am one of the few people who have heard of the saying: “Prevention is better than cure;” so I decided to learn what goes on inside a phisher’s mind. Upon researching on phishing and trying to figure out how a phisher’s mind thinks, I stumbled upon a website wherein an article they published discussed how it is to be a phisher.

In the earlier years of phishing, a phisher is known to be someone who experienced being phished or had witnessed somebody suffering from the damages of phishing at one point in his earlier life. Given that he or she had ample background of the Internet and its programming styles, then that person can imitate the phishing attack that got him or somebody close to him to do revenge or simply to acquire personal, financial information. But with the dawn of phishing kits, almost anyone can do it, like the novice script kiddies mentioned above.

In the course of a normal phisher’s life, he or she “gains” a multitude of virtual identities, acquired using the techniques we discussed above. Often, they can no longer track all those whom they have phished that they start building databases of phished credentials from their victims.

Phishers don’t stop when they have acquired some identities. Even though they are getting enough money from a good number of victims, phishers still are insatiable that they started resorting to social phishing. Usually, social networks contain e-mail addresses, which are accessed by the phisher once he gets hold of his victims’ passwords through key loggers. Upon looking around the e-mail addresses of his victims, the phisher can then determine how much his gains will be.At times, when the victim is registered to online transaction websites like eBay and Paypal, the phisher sells the accounts to scammers, who will be the ones doing the stealing.

When they start phishing, phishers become very meticulous virtual entities as they try to select the best Internet services to handle their attack elements: a convincing domain and an anonymous, often offshore host to carry out their spoof websites and Internet files and connections. Second, the phisher checks the page source of his target website, studying it to identify where he can place certain codes that will do the phishing for him. Third, he develops the spoof website with care and keenness so as to make it believable. After that, he will include certain scripts that will transfer information from the spoof page to his server using scripting languages for backend of websites. Lastly, he will deploy the spoof web page using any or all the techniques shown above, and wait for the “phished to take their bait.”

Phishers can fool as much as 10,000 people everyday. But to remain hidden from such big crowd, a phisher has to use his own virtual private network, a personally dedicated server, a copious amount of proxies, and encryption of his network signals that travels to and fro.

Finally, the reason why a phisher can still catch a good haul these days is because their adversaries, the good guys of Internet security, are “lazy” that phishers maintain a firm step ahead of them.

That’s pretty much it for the first part of our expedition in the world of phishing. In the second part, we will learn how to stop or avoid malicious phishing activities. Stay tuned!

Filed Under: Security Tagged With: crime, Internet, phishing, Security

Learning from Gerstmann-gate: Never Underestimate Your Online Community

December 6, 2007 by Devindra 6 Comments

gerstamnn.jpgJeff Gerstmann is an Internet god, or at least that’s how it would have seemed if you visited any gaming site since the world caught wind of his sudden dismissal on Thursday, November 29. From the moment I heard the shocking news, I knew that this incident wasn’t going to disappear in any tidy fashion. Gerstman was one of the most senior journalists from Gamespot, and the rumor at the time was that the dismissal was influenced by a negative review he published for the Eidos game Kane & Lynch.

Unfortunately for Gamespot, they were also running a massive ad campaign for Kane & Lynch at the same time. The juxtaposition of these two events led the gaming community to question Gamespot’s journalistic integrity. The gravity of the situation was clear. It was going to take some serious public relations work with the Gamespot community to smooth things over.

But of course, in all their infinite corporate wisdom, CNET had their own idea on how to handle this publicity mess: Just ignore it.

In hindsight, I’m sure they regret that decision now. The lack of communication from CNET, coupled with other unfortunately timed events, fueled the fire of confusion and anger by the gaming community. We can speculate endlessly as to why Gerstmann was fired: Perhaps Eidos was angered by his Kane & Lynch review, or perhaps it was a culmination of other behind the scenes events. In either case, CNET left the Gamespot community in the dark.

That was their mistake.

Gamespot is one of the longest running online gaming sites on the net. Launched in 1996, its had more than a decade to build what many Web 2.0 sites are rushing to do right now, a strong and dedicated community. All of that community building effort was reduced to shambles the instant CNET fired one of the most well-liked personalities from the site for seemingly shady reasons, and with little to no explanation.

In retribution, the Gamespot boards, not to mention the comment sections and forums of other major gaming sites, were flooded with posts about Gerstmann. Joystiq started a Gerstmann-gate series of posts compiling the many reactions that started popping up online. It was no surprise to anybody that a great majority of the gaming dialog that weekend was all related to Jeff Gerstmann in some way.

There was no real dialog with the Gamespot community until the release of the December 4 episode of their weekly podcast, the HotSpot. Needless to say, it was an incredible episode, and I’ll admit that the sheer amount of emotion in that podcast inspired me to write this piece.

In the podcast, some of the remaining Gamespot employees gathered around for a heartfelt farewell to Gerstmann, and an even more emotional apology to the fans. They stressed several times that the Gamespot staff was a fairly close family, and this sudden move by their parent company knocked them all off-kilter. They also stressed that their family also includes the Gamespot reader community.

One of the Gamespot staff members in the podcast summarized the horrible treatment of the community by CNET succinctly:

It’s not how you respect your userbase, and the people that have supported us and turned is into what we are.

This was exactly what the community needed to hear, and the fact that this message was delivered with such honesty made it all the more believable.

It’s obvious now that the decision to remove Gerstmann came down from on high in CNET corporate, but it’s even clearer that they had no idea how tightly knit the Gamespot community was. In the podcast, they mentioned that CNET stated that they “didn’t understand the Gamespot audience” or the circumstance of the situation. They also mentioned the obvious disconnect between the corporate CNET office, and the day-to-day workings of Gamespot proper. It’s refreshing to hear them be so up front about something that we all pretty much assumed the day Gerstmann was fired.

This, is communication CNET.

The lesson they need to learn for the future is that you simply can’t ignore your online community. This is especially true when you have one of the oldest and largest communities on the web. The trend towards transparency isn’t just a hip Web 2.0 fad. It’s a significant improvement on past communication models and will be the key to managing online communities from now on. Couple transparency with an attentive ear towards community dialog, and you have a recipe for a healthy online populace.

(Picture from Joystiq)

Filed Under: Internet Tagged With: gamespot, gerstmann, transparency, videogames

The Failure of a la Carte Cable is a Boon for New Media

December 5, 2007 by Devindra 1 Comment

A la carte cable is an idea that’s currently being promoted by the FCC, but it’s not exactly new. It refers to cable provider’s offering a cable system based on choice, rather than expensive packages where there are only a handful of worthwhile channels. I’m sure I’m not the only one who’s tired of paying $50 a month for a service that I barely find any value in. And yet, it’s the only way to access the occasional standout cable channel like Comedy Central, USA, or Sci Fi. When faced with a surely broken system such as this, the notion of a cable service where you pay only for what you want seems like an utopian dream.

Ever the dreamer, a la carte cable is something I’ve argued for among friends and other columns for the past few years. That is, until I came across this article by Joe Nocera at the New York Times. Nocera argues that a la carte cable is something that sounds wonderful in theory, but it actually falls apart when you consider the intricacies of cable’s astoundingly weird economics.

While I was sad to see that I was wrong this whole time, it quickly occurred to me that a la carte television isn’t truly dead–it will just be on our computers instead of our televisions. After all, isn’t it the very essence of new media?

Before I go on a new media rant, lets look at why exactly a la carte cable was never meant to be. Nocera mentions a 2004 F.C.C. study commissioned by then chairman Michael Powell:

To the surprise of many — including, I’m told, Mr. Powell himself — the study concluded that à la carte would have the exact opposite effect from what its backers claimed. Instead of reducing prices, à la carte would cause cable bills to rise for most people. And it would cause many channels to go out of business.

Why is this the case? In short, Nocera posits that cable channels will actually get more expensive when unbundled from the megapackages currently favored by cable companies. Since the networks charge the cable companies based on their total amount of subscribers to the cable package, that price would surely skyrocket in an a la carte world. Smaller networks that can’t acquire a decent amount of subscribers will simply die off.

New media is already living the a la carte dream. Youtube, College Humor, and all the other popular video sites let you control exactly what you want to watch. The move towards streaming network television shows online is making television less of a necessity for prime time fans. And services like Joost will give us even more of a television-like experience over the web.

Combine streaming video services with the multitude of ways to purchase digital content online and you have a recipe for the next evolution of television–precisely what a la carte cable would have been. This is even more apparent to geeky media types like myself who already watch all of this content on their televisions. Devices like the Apple TV, combined with digital content integration into traditional television devices like Tivo’s ability to download shows, offer us all a reason to forget about cable entirely.

I don’t think new media will kill cable television any time soon, but the potential is surely there in the long run. Cable will slowly adapt by adopting new media-esque characteristics like more on-demand content, downloadable content, and social services, until it’s basically a television interface for new media.

When that reversal occurs, at least there will always be something good on.

Filed Under: Media Tagged With: cable, new media, video

3 Great Sources for Free Scripts

December 4, 2007 by Steven 2 Comments

Web designers and developers are always looking for new ways to improve their sites and make them more interesting and useful for visitors. In some cases this can easily be accomplished by adding something to your site that you don’t even need to create. There are a number of large websites that contain free DHTML, Ajax, JavaScript, and more that can be added to your site very quickly (and for free).

DynamicDrive

My favorite source for scripts is DynamicDrive, which has hundreds of free scripts that are conveniently categorized to help you find what you’re looking for. Their tag line is “DHTML scripts for the real world,” and that’s a pretty good description of the site. Even if you are relatively new to web design you’ll find plain and simple instructions with most scripts that make them little more than a cut and paste.

dynamicdrive.jpg

Some of the categories of scripts found on DynamicDrive include form effects, menus and navigation, XML and RSS, image effects, and more. The menus and navigation section includes CSS-based menus as well as multi-level menus. In fact, DynamicDrive even contains a CSS Library that provides some of the best CSS navigation scripts you’ll find anywhere.

One of my favorite resources on the site is RSS Display Boxes, which allows you to easily include RSS headlines, excerpts or full posts on any website. In addition to the scripts, DynamicDrive also has several useful online tools such as an image optimizer, favicon generator, gradient image maker, button maker, and a few others.

The JavaScript Source

With over 2,500 scripts, The JavaScript Source has one of the largest collections available online. On this site you will find many of the same types of scripts as you will on DynamicDrive, but there is a bit more selection. Unfortunately, sometimes more options also makes it more difficult to find what you really want.

javascriptsite.jpg

From the home page you’ll see the latest additions to the script library, which can be really helpful if you are a frequent visitor or if you are just looking for the most current and up-to-date scripts. There really are so many scripts here that you have to just browse through to get an idea of everything that is available.

Much like DynamicDrive, The JavaScript Source also has a navigation section, which is always in demand by web designers. The naviagtion section isn’t limited to just navigation menu scripts, it also includes scripts for add-to-favorites, breadcrumb links, popups, dropdown boxes and more.

JavaFile

A third great source of scripts is JavaFile.com. Here you’ll find slideshow scripts, text effects, email forms, audio effects, plus many of the same types of resources that you’ll find at DynamicDrive and The JavaScript Source. One of the most useful sections of the site is ticker tapes category. If you’ve been looking for an easy way to scroll news, events or any kinds of updates and important information, a ticker scripts is a simple solution.

javafile.jpg

If you’re working on a new website or trying to improve an existing one, you may just find something at one of these sites that puts your design over the top. One caution: be sure not to go crazy and add too many scripts to your pages. Not only will it slow down the load time and affect the performance of the site, but it can create an overwhelming look for your visitors. Find the scripts that would bring the most benefit to your site and stick with them.

Filed Under: General Tagged With: dhtml, find, Internet, javascript, scripts, websites

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 296
  • Go to page 297
  • Go to page 298
  • Go to page 299
  • Go to page 300
  • Interim pages omitted …
  • Go to page 303
  • Go to Next Page »

Primary Sidebar

Privacy Policy

Copyright © 2021 · News Pro On Genesis Framework · WordPress · Log in