Jump to content


  • Content count

  • Joined

  • Last visited

  • Days Won


cornishpirate last won the day on November 14 2015

cornishpirate had the most liked content!

1 Follower

Profile Information

  • Real Name
  • Location
    Cornwall, England
  • Website

Recent Profile Visitors

25,672 profile views
  1. cornishpirate

    PHP 7

    Just updated my server to run PHP 7.3. Running live site now using it No significant issues at all - just a Deprecated warning in PHPmailer which was easily fixed. Various benchmarks suggest about a 10% speed improvement.
  2. This seems to agree with this. Field Fisher are a large London law firm. https://privacylawblog.fieldfisher.com/2017/re-consenting-to-marketing-under-gdpr
  3. cornishpirate

    Upgrading to the latest version

    Running MariaDB 10.1.25 under Plesk 12.5 with no problems. That statement is tempting fate!
  4. cornishpirate

    PHP 7

    PHP 7 is available with xampp.
  5. cornishpirate

    PHP 7

    Very interesting summary of PHP performance increase over the versions: https://www.phpclasses.org/blog/post/493-php-performance-evolution.html Real incentive to move to PHP 7 ! See also the potential for what may be PHP 8.
  6. cornishpirate

    PHP 7

    Dan, well it started as RC2a ! It's very heavily modified, both in terms of keeping it updated, secure, improving efficiency, making it responsive and extending facilities. However, it didn't take too much to make it run under PHP 7. I just made a point of ensuring all notices, warnings and errors from the log were dealt with. Alan PS Having a lifetime in software developement helped!
  7. cornishpirate

    PHP 7

    After exhaustive testing on our preview site, I took a deep breath and invoked PHP 7.05 on the live site yesterday. Pleased to report that all went extremely well and the performance improvement is considerable. No horrible suprises in the error logs either.
  8. cornishpirate

    PHP 7

    PHP7.0 now released and performing extremely well under Plesk 12.5 and nginx. No new problems found yet - will continue testing for at least another month. Very encouraging for the world of PHP.
  9. cornishpirate

    PHP 7

    Nice free guide 'Upgrading to PHP 7" http://www.oreilly.com/web-platform/free/files/upgrading-to-php-seven.pdf
  10. cornishpirate

    PHP 7

    Should be OK as long as you've moved to MySQli. From memory, I just changed the code to avoid Deprecated warnings on PHP 4 style constructors (methods that have the same name as the class they are defined in). Working well on my test site with PHP7 RC6, but will be giving it a comprehensive test as soon as 7.0 is released, likely to be next week.
  11. cornishpirate

    PHP 7

    There isn't a PHP 5.7. Details about PHP 7.0 RC1 are at http://www.php.net Extract:
  12. cornishpirate

    PHP 7

    Because it will be released this year and the performance improvement is amazing. Check out the benchmarks.
  13. cornishpirate

    PHP 7

    Have just been playing with PHP 7 RC1 using these instructions as a guide: https://phpdave.wordpress.com/2015/06/15/run-php-7-alpha-on-windows-in-3-steps/ Could only use the built-in webserver and php.ini needed tweeking for mysqli but, all in all, a very simple process. Using my heavily modified RC2a system, I managed to load all pages very easily and VERY FAST! Encouraging.
  14. cornishpirate

    Using a non-relational database with osCommerce (Discussionu)

    If you install the LORI add-on in Firefox, it will give you Time to First Byte and Time to Completion on any page that is loaded. Then you can easily see if server side is slow or page rendering is slow. Or both of course.
  15. In the UK, Streamline, now part of Worldpay, are pushing hard for PCI DSS compliance. They've teamed up with TrustWave and we've been encouraged to use their TrustKeeper IP Scanning system for vulnerabilities. The only item my site is failing on is XSS, despite the magnificent presence of Security Pro 2!! URL: ....../product_info.php?products_id=%3Cscript%3Ealert%28TK00000004%29%3C%2Fscript%3E Body matches: Vulnerability type: Reflected Cross-Site Scripting Vulnerable input type: URL Query Parameter Vulnerable input name: products_id This may be a very dubious failure, but many of us will have to deal with it. Any thoughts?