Flag | Description | Truthy Example | Falsey Example |
---|---|---|---|
^ |
Matches the beginning of input | /^b/.test("bananas") |
/^ananas/.test("bananas") |
\ |
In effect reverses the 'specialness' of a letter | /\bb/.test("bananas") |
/b\b/.test("bananas") |
$ |
Matches the end of input | /anas$/.test("bananas") |
/banan$/.test("bananas") |
* |
Matches the preceeding expression 0 or more times | /bananas*/.test("banana") or /bananas*/.test("bananasssssssss") |
/(bananas)*/.test("monkey") |
+ |
Matches the preceeding expression 1 or more times | /bananas+/.test("bananasss") |
/bananas+/.test("banana") |
? |
Matches the preceeding character 0 or 1 time | /ba?na?na?/.exec("banana") // => ["banana"] or /ba?na?na?/.exec("bnn") // => ["bnn"] |
/ba?na?na?/.exec("bana") // => null |
When you want to learn a new framework or programming language, chances are you'll Google something like "how do i run php locally?" or "how do i make a blog with CakePHP?". Funnily enough, Google will provide you with results that tell you just that, but no more.
If you want to really learn and understand web development or the like, you need to actually know what's happening, rather than just knowing which buttons to hit to make magic happen.
n.b. You need to download and install both MAMP and MAMP Pro
-
Under
General
in the preferences clickSet default MAMP ports
and hitSave
-
Open Terminal and stop Apache:
See Updates for new additional info
SUPEE-6788 is a bundle of patches for Magento. From the Magento Commerce website:
[SUPEE-6788] provides protection against several types of security-related issues, including remote code execution, information leaks and cross-site scripting.
## Why is it more complicated than previous patches?
- Download, install and setup MAMP or MAMP Pro
n.b. For further instructions on how to set-up Mamp Pro like a pro, see this Gist
-
Expand the Magento tar file into your chosen directory (I use
~/Dev
), rename the createdmagento
folder as you wish and enter the directory
## User Setup
### Adding a User
Once you've found a suitable server you'll need to login to it and manage it from the command line. Usually you will be given root access (this means a root user exists on the server, with no restrictions) initially and it's up to you to secure the server with best practices. For any public facing server it is recommended that you setup a new user and disable log in using the root user.
$ adduser <example>