10 Great Photoshop Tutorials for Clever Designer

August 30, 2011

This tutorial is not for the fresh designer, But If You have basic knowledge on photoshop, You are most invited to check all the tutorials. Even the most complex digital artworks are built on a foundation of simple actions. These 20 tutorials are aimed at the clever designer  who wants to master Photoshop from the roots.

Amazing Photoshop light effect in 10 Steps:
Amazing Photoshop light effect
Manipulating a WW2 Fighter Aircraft:
In this tutorial we will be learning some indispensable techniques to use for any type of photo-manipulation. The techniques used here are the same for any type of ‘destruction’ photo-manipulation.
Fighter Aircraft
How to Cover Text in Stitches:
Cover Text in Stitches:

Create Cool Watercolor Effects in Photoshop:
In this tutorial You will see  a quick way to simulate that an watercolor effects using only Photoshop and some brushes.
Cool Watercolor Effects
How to create a T-shirt from scratch:
T-shirt from scratch
How to Design a Glossy Download Icon:

Glossy Download Icon

How to Create a Wicked-Worn Vintage Pop Art Design:
wicked-worn-vintage-pop-art-design
How to Design a Vista Styled Wallpaper:
Vista-Styled-Wallpaper
How to create a Wavy Blackberry Style Wallpaper Design:

How to design a Mysterious Lighting Effect using Photoshop:
Here’s a nifty little lighting effect that we can create in Adobe Photoshop using the Lighting Effects filter. It’s a really simple way to give a flat graphic some flare!
Design a Mysterious Lighting Effect using Photoshop

 

Advertisements

Basic Informations about Photography

August 30, 2011

Photography Can be defined as an art, science, or practice of creating pictures by recording radiation on a radiation-sensitive medium, such as a photographic film, or electronic image sensors or camera. (A camera is a device that records and stores images. These images may be still photographs or moving images such as videos or movies. The term camera comes from the camera obscura (Latin for “dark chamber“), an early mechanism for projecting images. The still camera takes one photo each time the user presses the shutter button. A typical movie camera continuously takes 24 film frames per second as long as the user holds down the shutter button, or until the shutter button is pressed a second time).

camera

Photography is an expansive art form that includes more than just portraiture, landscape or glamor photography. A professional photographer may work in photojournalism, an amateur may be particularly interested in macrophotography.Accordion to photography.com

We can separate photography into the following categories :

  1. Photojournalism
  2. Documentary Photography
  3. Action Photography
  4. Macrophotography
  5. Microphotography
  6. Glamour Photography
  7. Aerial Photography
  8. Underwater Photography
  9. Art Photography
  10. Portraiture
  11. Wedding Photography
  12. Advertising Photography
  13. Travel Photography

Frequent Ask questions about web security

August 27, 2011

Session Credential:
A Session ID tracks a user’s session, or perhaps just his current session, as he traverse the web site. Session  is an string of data provided by the web server, normally stored within a cookie or URL, which identifies a user and authorizes them to perform various actions.

SSI Injection:
A server-side exploit technique that allows an attacker to send code into a web application, which will be executed by the web server.

What is SQL injection or SQL poisoning?
SQL Injection happens when a developer accepts user input that is directly placed into a SQL Statement and doesn’t properly filter out dangerous characters. SQL or Structured Query Language, originally developed by IBM is now an ANSI and ISO standard. SQL injection or SQL poisoning as it is called is a method of attack by which an attacker can input simple SQL commands and construct SQL queries harmful for the host system. Most of the databases in use allow SQL to access data from database. In case an user input is used to form a query without proper checking of the input, an attacker may try to form a SQL query by well-crafted inputs. For eg. : If a developer is doing something like : “SELECT user from table_user where user = ‘” + user_name + ” ‘ and password = ‘” + password + “‘” an attacker can input : ‘ OR 1 == 1 — The last two characters (i.e. double dash) will comment out whatever follows the last ‘1’ in the input. Now, as 1==1 is an ‘OR’ condition and always true the user can login no matter what password he enters.
There are two commonly known methods to indentify and exploit SQL injection attacks — SQL injection and blind SQL injection: SQL injection : This method is to identify the existence of SQL injection vulnerability by looking at the error messages output-ed during an attack. However, when the error messages shown are not explicit, the attacker may try the ‘blind SQL injection attack’ to find out if a vulnerability exists at all or not.

What is clickjacking?
Clickjacking is a way of tricking the user to click on an unsuspicious link or button. Clickjacking  might be done with the intention of obtaining confidential information. The user might click on an unsuspicious button or a link which might trigger a script. The attacker can steal important information and or take control over the computer.

Virus?
Virus is a computer virus written programatically to destroy computer system or damage to information stored in storage system. Virus can copy itself and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability.

Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.

Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up.

Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect.

What is a trojan-horse?
Trojan-horse is an harmful computer program in the disguise of a harmless one. It normally keeps hiding in some executable file and the moment the executable is run, the trojan gets itself installed in the victim’s machine.

What is Net-Bios attack?
It is an old way of attacking an unsuspecting user who has file/printer sharing turned on. A simple command like net view shows up all the directories/files that the target user has shared on his computer system.

What is a badware?
As per stopbadware.com, an application can be called badware if :
1. It tries to act deceptively
2. It engages in potential harmful behavior for the user without disclosing the consequences in simple non-technical language and obtaining the permission of the user.

What is domain grabbing?
Domain-grabbing s a mini-industry in today’s date. The term ‘domain grabbing’ refers to the act of obtaining popular expiring domains. There are services offered over the internet which allows an individual to specify a domain name he wants to register (an existing domain name) and the very second it expires, such services registers the domain by the name of the concerned individual. Some of the leading sites offering such services are SnapNames.com, NameWinner.com, ExpireFish.com, domain.com.

What is cyber squatting?

One of the best examples of cyber squatting was the domain name ‘wallstreet.com’. ‘wallstreet.com’ was registered in 1994 for just $70 and sold for one million dollars in 1999! You can find a lot of examples like this. There is always a fierce competition amongst some netizens to register the most popular domain names and then sell them off at a profit. Cyber-squatting is the act of grabbing popular domain names before they can be regisered by the legitimate user.

To counter this menace of cyber squatting, the U.S government passed the Anti-Cybersquatting Consumer Protection Act in 1999, which enables trademark holders to claim civil damages upto a hundred thousand dollars from cybersquatters that register their trade names or similar-sounding names as domain names.

PHP script to convert String into a image

August 25, 2011

This is just a simple script that will get string from user and convert it to image then output it. You may use it  to convert your text name, email address, web site url, etc. This script automatically calculates the width of text into pixels inserts the PNG or gif image.

In this script we use three files – Index.php, index2.php, and text_image.php.
Step 1: Create a form to pass string in the index.php. Some thing like this:

Use the below code:

<form action=”index2.php” method=”post”>

<label for=”email”>Email:</label>
<input type=”text” name=”email” id=”email” value=”” /><br />
<input type=”submit” value=”Convert” />

</form>

Step 2: Copy and peste the below code to text_image.php

<?php
$string_email = $_GET[’email’];

header (“Content-type: image/png”);
$font   = 5;
$width  = ImageFontWidth($font) * strlen($string_email);
$height = ImageFontHeight($font);
$im = @imagecreate ($width,$height);
$background_color = imagecolorallocate ($im, 255, 255, 255); //white background
$text_color = imagecolorallocate ($im, 0, 0,0);//black text
imagestring ($im, $font, 0, 0,  $string_email, $text_color);
imagepng ($im);
?>

Step 3: Just showing the text converting to image. To call the script for dynamically generating an image just use the below html code :

<img src=”text_image.php?email=<?php echo $string_email; ?>” border=”0″>

 

You can also download the script from here

 

Enjoy
Wish You will like it.

Script for Google Page Rank

August 20, 2011

Ever wanted to display the Google Page Rank on your website using your script hosted on your server? Now you can download and implement a pagerank script right on your website, show pageranks for both you and your friends’ websites!

What do you need in order to make this work?

  • PHP support from your host for processing the script
  • basic PHP knowledge
  • this website 🙂

<?php
// content of somefile.php
include(‘pagerank.php’);
$pr = getPageRank(‘http://www.pagerankcode.com&#8217;);
echo ‘pagerankcode.com has PR ‘.$pr;
?>

<?php
define(‘GOOGLE_MAGIC’, 0xE6359A60);
function _zeroFill($a, $b){
$z = hexdec(80000000);
if ($z & $a){
$a = ($a>>1);
$a &= (~$z);
$a |= 0x40000000;
$a = ($a>>($b-1));
}else
$a = ($a>>$b);
return $a;
}

function _mix($a,$b,$c){
$a -= $b; $a -= $c; $a ^= (_zeroFill($c,13));
$b -= $c; $b -= $a; $b ^= ($a<<8);
$c -= $a; $c -= $b; $c ^= (_zeroFill($b,13));
$a -= $b; $a -= $c; $a ^= (_zeroFill($c,12));
$b -= $c; $b -= $a; $b ^= ($a<<16);
$c -= $a; $c -= $b; $c ^= (_zeroFill($b,5));
$a -= $b; $a -= $c; $a ^= (_zeroFill($c,3));
$b -= $c; $b -= $a; $b ^= ($a<<10);
$c -= $a; $c -= $b; $c ^= (_zeroFill($b,15));
return array($a,$b,$c);
}

function _GoogleCH($url, $length=null, $init=GOOGLE_MAGIC){
if(is_null($length))
$length = sizeof($url);
$a = $b = 0x9E3779B9;
$c = $init;
$k = 0;
$len = $length;
while($len >= 12){
$a += ($url[$k + 0] + ($url[$k + 1] << 8) + ($url[$k + 2] << 16) + ($url[$k + 3] << 24));
$b += ($url[$k + 4] + ($url[$k + 5] << 8) + ($url[$k + 6] << 16) + ($url[$k + 7] << 24));
$c += ($url[$k + 8] + ($url[$k + 9] << 8) + ($url[$k + 10] << 16) + ($url[$k + 11] << 24));
$_mix = _mix($a,$b,$c);
$a = $_mix[0]; $b = $_mix[1]; $c = $_mix[2];
$k += 12;
$len -= 12;
}
$c += $length;
switch($len){
case 11: $c += ($url[$k + 10] << 24);
case 10: $c += ($url[$k + 9] << 16);
case 9 : $c += ($url[$k + 8] << 8);
case 8 : $b += ($url[$k + 7] << 24);
case 7 : $b += ($url[$k + 6] << 16);
case 6 : $b += ($url[$k + 5] << 8);
case 5 : $b += ($url[$k + 4]);
case 4 : $a += ($url[$k + 3] << 24);
case 3 : $a += ($url[$k + 2] << 16);
case 2 : $a += ($url[$k + 1] << 8);
case 1 : $a += ($url[$k + 0]);
}
$_mix = _mix($a,$b,$c);
return $_mix[2];
}

function _strord($string){
for($i = 0;$i < strlen($string);$i++)
$result[$i] = ord($string{$i});
return $result;
}

function getPageRank($url){
$pagerank = -1;
$ch = “6”._GoogleCH(_strord(“info:” . $url));
$fp = fsockopen(“www.google.com”, 80, $errno, $errstr, 30);
if($fp){
$out = “GET /search?client=navclient-auto&ch=” . $ch . “&features=Rank&q=info:” . $url . ” HTTP/1.1\r\n”;
$out .= “Host: http://www.google.com\r\n”;
$out .= “Connection: Close\r\n\r\n”;
fwrite($fp, $out);
while (!feof($fp)){
$data = fgets($fp, 128);
$pos = strpos($data, “Rank_”);
if($pos === false){
}else
$pagerank = substr($data, $pos + 9);
}
fclose($fp);
}
return $pagerank;
}
?>

 

Download Here
Credit to: pagerankcode.com

Hello world!

December 6, 2009

You are invited to visit Tutorial Publications for useful & latest tutorial  about PHP Tutorial,    Codeigniter Framework TutorialCakePHP TutorialWordPress TutorialJoomla Tutorial,JSP TutorialsJava Servlets Tutorials,  J2EE TutorialsXML and MySQL Tutorials.




http://tutpub.com/
http://tutpub.com/downloads/