Warning: Uninitialized string offset 2 in /home/theghost/public_html/includes/language.php on line 226

Warning: Undefined array key "" in /home/theghost/public_html/includes/language.php on line 227
TheGhosts Online Humble Abode » Titanium SandBox
TheGhosts Online Humble Abode
     
PHP-Nuke Plaitnum v3
PHP-Nuke Titanium v4.0.3 / PHP v8.2.17
Sponsor Tron for PHP-Nuke Titanium
::: There is so much more here to see, it takes 30 seconds to register an account and we don't even verify with e-mail! Just register we promise you won't be sorry... ::: Login or Register
IPHub is an IP lookup website featuring Proxy/VPN detection. A free API is available, so you can perform fraud checks on online stores, detect malicious players on online games and much more! Look at this! Click here Look at this! to sign up for FREE today at ipHub ::: Country Music: The Soul Circus Cowboys ::: Sponsor: Brandon Maintenance Management, LLC Phone: 813-846-2865 ::: Sponsor: Big Country Radio - The EJ Morning Show :::

The Titanium Sandbox Module v4.0.3 : This module is only for PHP-Nuke Titanium application builders. A sandbox is a testing environment that isolates untested code changes. This module was designed for the developers over at The 86it Developers Network, it gives the user a place to test random PHP code and is a good way to start learning PHP-Nuke Titanium, PHP, Java, cURL or just about any online programming language you can think of. There are no limits when it comes to The 86it Developers Network, they allow you full access to any programming language that you would like to explore.

Languages Available: HTML - HyperText Markup Language, CGI - Common Gateway Interface, Javascript, Java, PHP, XML - eXtensible Markup Language, Perl, Python, cURL, Linux C

Below you will find links that will load the example templates. You can open the corresponding PHP files in Dream Weaver or Visual Studio Coode to explore and learn new ways to code.Click on any of the links and then scroll down the page, and you will see that it has loaded the example for you to view before you explore the source code!

Click here to show | hide source code

Warning: Array to string conversion in /home/theghost/public_html/modules/Titanium_SandBox/x-host_information.php on line 106
Guide to absolute paths...

Data: __FILE__
Data type: String
Purpose: The absolute pathname of the running PHP file, including the filename.
Caveat: This is not the file called by the PHP processor, it's what is running. So if you are inside an include, it's the include.
Caveat: Symbolic links are pre-resolved, so don't trust comparison of paths to be accurate.
Caveat: Don't assume all operating systems use '/' for the directory separator.
Works on web mode: Yes
Works on CLI mode: Yes


Data: __DIR__
Data type: String
Purpose: The absolute pathname to the running PHP file, excluding the filename
Caveat: This is not the file called by the PHP processor, it's what is running. So if you are inside an include, it's the include.
Caveat: Symbolic links are pre-resolved, so don't trust comparison of paths to be accurate.
Caveat: Don't assume all operating systems use '/' for the directory separator.
Works on web mode: Yes
Works on CLI mode: Yes


Data: $_SERVER['SCRIPT_FILENAME']
Data type: String
Purpose: The absolute pathname of the origin PHP file, including the filename
Caveat: Not set on all PHP environments, may need setting by copying from __FILE__ before other files are included.
Caveat: Symbolic links are not pre-resolved, use PHP's 'realpath' function if you need it resolved.
Caveat: Don't assume all operating systems use '/' for the directory separator.
Caveat: "Filename" makes you think it is just a filename, but it really is the full absolute pathname. Read the identifier as "Script's filesystem (path)name".
Works on web mode: Yes
Works on CLI mode: Yes


Data: $_SERVER['PATH_TRANSLATED']
Data type: String
Purpose: The absolute pathname of the origin PHP file, including the filename
Caveat: It's probably not set, best to just not use it. Just use realpath($_SERVER['SCRIPT_FILENAME']) (and be aware that itself may need to have been emulated).
Caveat: Symbolic links are pre-resolved, so don't trust comparison of paths to be accurate.
Caveat: Don't assume all operating systems use '/' for the directory separator.
Works on web mode: Yes
Works on CLI mode: No


Data: $_SERVER['DOCUMENT_ROOT']
Data type: String
Purpose: Get the absolute path to the web server's document root. No trailing slash.
Caveat: Don't trust this to be set, or set correctly, unless you control the server environment.
Caveat: May or may not have symbolic links pre-resolved, use PHP's 'realpath' function if you need it resolved.
Caveat: Don't assume all operating systems use '/' for the directory separator.
Works on web mode: Yes
Works on CLI mode: No


Note that if something is not set it may be missing from Array, or it may be blank, so use PHP's 'empty' function for your test.
Note that if you call "phpinfo" on the command line then naturally some of these settings are going to be blank, as no PHP file is involved.

1. All elements of the $_SERVER array whose keys begin with 'HTTP_' come from HTTP request headers and are not to be trusted.

2. All HTTP headers sent to the script are made available through the $_SERVER array, with names prefixed by 'HTTP_'.

3. $_SERVER['PHP_SELF'] is dangerous if misused. If login.php/nearly_arbitrary_string is requested, $_SERVER['PHP_SELF'] will contain
not just login.php, but the entire login.php/nearly_arbitrary_string. If you've printed $_SERVER['PHP_SELF'] as the value of the action attribute
of your form tag without performing HTML encoding, an attacker can perform XSS attacks by offering users a link to your site such as this:


<a href='http://www.example.com/login.php/
"><script type="text/javascript">...</script><span a="'>Example.com</a>

The javascript block would define an event handler function and
bind it to the form's submit event. This event handler would load via an <img> tag an external file, with the submitted username and password as parameters.


Use $_SERVER['SCRIPT_NAME'] instead of $_SERVER['PHP_SELF']. HTML encode every string sent to the browser that should not be interpreted
as HTML, unless you are absolutely certain that it cannot contain anything that the browser can interpret as HTML.
Guide to script parameters...

Data: $_GET
Data type: Array (map)
Purpose: Contains all GET parameters (i.e. a parsed URL query string).
Caveat: GET parameter names have to be compliant with PHP variable naming, e.g. dots are not allowed and get substituted.
Works on web mode: Yes
Works on CLI mode: No


Data: $_SERVER['QUERY_STRING']
Data type: String
Purpose: Gets an unparsed URL query string.

Warning: Array to string conversion in /home/theghost/public_html/modules/Titanium_SandBox/x-host_information.php on line 138
Caveat: Not set on all PHP environments, may need setting via http_build_query(Array).
Works on web mode: Yes
Works on CLI mode: No


Data: $_SERVER['argv']
Data type: Array (list)
Purpose: Get CLI call parameters.
Works on web mode: Tenuous (just contains a single parameter, the query string)
Works on CLI mode: Yes

Guide to URL paths...

Data: $_SERVER['PHP_SELF']
Data type: String
Purpose: The URL path name of the current PHP file, including path-info (see $_SERVER['PATH_INFO']) and excluding URL query string. Includes leading slash.
Caveat: This is after URL rewrites (i.e. it's as seen by PHP, not necessarily the original call URL).
Works on web mode: Yes
Works on CLI mode: Tenuous (emulated to contain just the exact call path of the CLI script, with whatever exotic relative pathname you may call with, not made absolute and not normalised or pre-resolved)


Data: $_SERVER['SCRIPT_NAME']
Data type: String
Purpose: The URL path name of the current PHP file, excluding path-info and excluding URL query string. Includes leading slash.
Caveat: This is after URL rewrites (i.e. it's as seen by PHP, not necessarily the original call URL).
Caveat: Not set on all PHP environments, may need setting via preg_replace('#\.php/.*#', '.php', $_SERVER['PHP_SELF']).
Works on web mode: Yes
Works on CLI mode: Tenuous (emulated to contain just the exact call path of the CLI script, with whatever exotic relative pathname you may call with, not made absolute and not normalised or pre-resolved)


Data: $_SERVER['REDIRECT_URL']
Data type: String
Purpose: The URL path name of the current PHP file, path-info is N/A and excluding URL query string. Includes leading slash.
Caveat: This is before URL rewrites (i.e. it's as per the original call URL).
Caveat: Not set on all PHP environments, and definitely only ones with URL rewrites.
Works on web mode: Yes
Works on CLI mode: No


Data: $_SERVER['REQUEST_URI']
Data type: String
Purpose: The URL path name of the current PHP file, including path-info and including URL query string. Includes leading slash.
Caveat: This is before URL rewrites (i.e. it's as per the original call URL). *
*: I've seen at least one situation where this is not true (there was another $_SERVER variable to use instead supplied by the URL rewriter),
but the author of the URL rewriter later fixed it so probably fair to dismiss this particular note.
Caveat: Not set on all PHP environments, may need setting via $_SERVER['REDIRECT_URL'] . '?' . http_build_query($_GET) [if $_SERVER['REDIRECT_URL']
is set, and imperfect as we don't know what GET parameters were originally passed vs which were injected in the URL rewrite]

Warning: Array to string conversion in /home/theghost/public_html/modules/Titanium_SandBox/x-host_information.php on line 186
--otherwise-- $_SERVER['PHP_SELF'] . '?' . http_build_query(Array).
Works on web mode: Yes
Works on CLI mode: No


Data: $_SERVER['PATH_INFO']
Data type: String
Purpose: Find the path-info, which is data after the .php filename in the URL call. It's a strange concept.
Caveat: Some environments may not support it, it is best avoided unless you have complete server control
Works on web mode: Yes
Works on CLI mode: No

Warning: Array to string conversion in /home/theghost/public_html/modules/Titanium_SandBox/x-host_information.php on line 198
Note that if something is not set it may be missing from Array, or it may be blank, so use PHP's 'empty' function for your test.
Be warned that most contents of the Server-Array (even $_SERVER['SERVER_NAME']) are provided by the client and can be manipulated. They can also be used for injections and thus MUST be checked and treated like any other user input.

Warning: Array to string conversion in /home/theghost/public_html/modules/Titanium_SandBox/x-host_information.php on line 210
PHP_SELF/modules.php
argvArray
argc1
GATEWAY_INTERFACECGI/1.1
SERVER_ADDR23.111.129.42
SERVER_NAMEwww.theghost.86it.us
SERVER_SOFTWAREApache
SERVER_PROTOCOLHTTP/1.1
REQUEST_METHODGET
REQUEST_TIME1711647770
REQUEST_TIME_FLOAT1711647770.0309
QUERY_STRINGname=Titanium_SandBox&mode=3
DOCUMENT_ROOT/home/theghost/public_html
HTTP_ACCEPT*/*
HTTP_ACCEPT_CHARSETUNKNOWN
HTTP_ACCEPT_ENCODINGUNKNOWN
HTTP_ACCEPT_LANGUAGEUNKNOWN
HTTP_CONNECTIONUNKNOWN
HTTP_HOSTwww.theghost.86it.us
HTTP_REFERERUNKNOWN
HTTP_USER_AGENTclaudebot
HTTPSon
REMOTE_ADDR3.88.60.5
REMOTE_HOSTUNKNOWN
REMOTE_PORT34760
REMOTE_USERUNKNOWN
REDIRECT_REMOTE_USERUNKNOWN
SCRIPT_FILENAME/home/theghost/public_html/modules.php
SERVER_ADMINwebmaster@theghost.86it.us
SERVER_PORT443
SERVER_SIGNATURE
PATH_TRANSLATEDUNKNOWN
SCRIPT_NAME/modules.php
REQUEST_URI/modules.php?name=Titanium_SandBox&mode=3
PHP_AUTH_DIGESTUNKNOWN
PHP_AUTH_USERUNKNOWN
PHP_AUTH_PWUNKNOWN
AUTH_TYPEUNKNOWN
PATH_INFOUNKNOWN
ORIG_PATH_INFOUNKNOWN


[ SANDBOX TEST LINKS ]

This files can be found in the folder: https://www.theghost.86it.us/modules/Titanium_SandBox/x-clean_slate_template.php
[ CLEAN SLATE TEMPLATE ] Written by Ernest Allen Buffington 9/15/2017

This files can be found in the folder: https://www.theghost.86it.us/modules/Titanium_SandBox/x-fullscreen_shockwave_example_description
[ FULLS SCREEN SWF DISPLAY ] Written by Ernest Allen Buffington 7/30/2013

This files can be found in the folder: https://www.theghost.86it.us/modules/Titanium_SandBox/x-facebook_testing_template.php
[ FACEBOOK LOGIN CODE EXAMPLE ] Written by Ernest Allen Buffington 6/20/2012

This files can be found in the folder: https://www.theghost.86it.us/modules/Titanium_SandBox/x-host_information.php
[ GUIDE TO ABSOLUTE PATHS ] Written by Ernest Allen Buffington 1/1/2010

This files can be found in the folder: https://www.theghost.86it.us/modules/Titanium_SandBox/x-browser_check.php
[ BROWSER AND OS CHECK EXAMPLE CODE ] Written by Ernest Allen Buffington 3/1/2012

This files can be found in the folder: https://www.theghost.86it.us/modules/Titanium_SandBox/x-project_template.php
[ FLASH LAYOUT CODE EXAMPLES ] Written by Ernest Allen Buffington 9/5/2017

This files can be found in the folder: https://www.theghost.86it.us/modules/Titanium_SandBox/x-php5_audiotag_example.php
[ HTML 5 AUDIO TAG EXAMPLE ] Written by Ernest Allen Buffington 7/30/2013

This files can be found in the folder: https://www.theghost.86it.us/modules/Titanium_SandBox/x-file_get_contents_example.php
[ cURL CODE FETCH EXAMPLE ] Written by Ernest Allen Buffington 7/30/2013

This files can be found in the folder: https://www.theghost.86it.us/modules/Titanium_SandBox/x-bootstrap_4_modal.php
[ Loading JQuery and Bootstrap with a few Modal Examples ] Written by Ernest Allen Buffington 08/05/2022


modules/Titanium_SandBox Your facebook SandBox folder, which is relative to your portal root directory (public_html).
browser_check.php (Browser Check :: example created by Ernest Allen Buffington.) browser_check.php Browser Check :: example created by Ernest Allen Buffington.
copyright.php (This file contains the copyright information for the facebook SandBox Module.) copyright.php This file contains the copyright information for the facebook SandBox Module.
facebook_testing_template.php (Facebook Testing Template :: example created by Ernest Allen Buffington.) facebook_testing_template.php Facebook Testing Template :: example created by Ernest Allen Buffington.
host_information.php (Host Information Check :: example created by Ernest Allen Buffington.) host_information.php Host Information Check :: example created by Ernest Allen Buffington.
index.php (module index file.) index.php This is your module index file, this is where we call your project file.
php5_audiotag_example.php (How to use PHP 5's audio tags :: example created by Ernest Allen Buffington.) php5_audiotag_example.php How to use PHP 5's audio tags :: example created by Ernest Allen Buffington.
project_template.php (This file is a project template (code example).) project_template.php This file is a project template (code example).
x-bootstrap_4_modal.php (x-bootstrap_4_modal.php is NOW LOADED :: Loading JQuery and Bootstrap with a few Modal Examples | created by Ernest Allen Buffington 03/01/2022) x-bootstrap_4_modal.php x-bootstrap_4_modal.php is NOW LOADED :: Loading JQuery and Bootstrap with a few Modal Examples | created by Ernest Allen Buffington 03/01/2022
x-browser_check.php (Browser Check :: example created by Ernest Allen Buffington.) x-browser_check.php Browser Check :: example created by Ernest Allen Buffington.
x-clean_slate_template.php (x-clean_slate_template.php is NOW LOADED :: Code Template created by Ernest Allen Buffington 03/01/2012) x-clean_slate_template.php x-clean_slate_template.php is NOW LOADED :: Code Template created by Ernest Allen Buffington 03/01/2012
x-facebook_testing_template.php (facebook_testing_template.php is NOW LOADED :: Code Template created by Ernest Allen Buffington 07/30/2013) x-facebook_testing_template.php facebook_testing_template.php is NOW LOADED :: Code Template created by Ernest Allen Buffington 07/30/2013
x-file_get_contents_example.php (Get File Contents Expample :: Gets a Mobile ID list from a website! :: Example created by Ernest Allen Buffington Tuesday 9/5/2017.) x-file_get_contents_example.php Get File Contents Expample :: Gets a Mobile ID list from a website! :: Example created by Ernest Allen Buffington Tuesday 9/5/2017.
x-fullscreen_shockwave_example.php ( x-fullscreen_shockwave_example.php is NOW LOADED :: Code Template created by Ernest Allen Buffington 09/15/2017) x-fullscreen_shockwave_example.php x-fullscreen_shockwave_example.php is NOW LOADED :: Code Template created by Ernest Allen Buffington 09/15/2017
x-host_information.php (Host Information Check :: example created by Ernest Allen Buffington.) x-host_information.php Host Information Check :: example created by Ernest Allen Buffington.
x-php5_audiotag_example.php (How to use HTML 5's audio tags :: example created by Ernest Allen Buffington.) x-php5_audiotag_example.php How to use HTML 5's audio tags :: example created by Ernest Allen Buffington.
x-project_template.php (This file is a project template (code example).) x-project_template.php This file is a project template (code example).

modules/Titanium_SandBox/admin Module Sub Folder
case.php (admin case file.) case.php admin case file.
index.php (module index file.) index.php directory index file.
install.php ( x-fullscreen_shockwave_example.php is NOW LOADED :: Code Template created by Ernest Allen Buffington 09/15/2017) install.php x-fullscreen_shockwave_example.php is NOW LOADED :: Code Template created by Ernest Allen Buffington 09/15/2017
links.php (No Description Yet.) links.php No Description Yet.
panel.php (No Description Yet.) panel.php No Description Yet.

modules/Titanium_SandBox/css Module Sub Folder
style.css Cascading Style Sheet for the facebook SandBox Module.
x-bootstrap_4_modal.css please add the file x-bootstrap_4_modal_description.css to modules/Titanium_SandBox/project_file_decriptions folder.

modules/Titanium_SandBox/facebook Module Sub Folder
custom_share_axample_01.php (custom facebook share :: example created by Ernest Allen Buffington.) custom_share_axample_01.php custom facebook share :: example created by Ernest Allen Buffington.
standard_comments.php (standard comments :: example created by Ernest Allen Buffington.) standard_comments.php standard comments :: example created by Ernest Allen Buffington.

modules/Titanium_SandBox/images Module Sub Folder
FBshare.png image file
Titanium_SandBox.png image file
bar.gif image file
css.png image file
css3-html5-bootstrap.png image file
customLogo.png image file
facebook_SandBox.png image file
facebook_SandBox1.png image file
favicon.ico image file
finger-pointing-left-icon-grey.png image file
finger-pointing-left-icon.png image file
finger-pointing-right-icon.png image file
folder.png image file
ghost.jpg image file
php-file-active.png image file
php-file.png image file
pointright.gif image file
sandbox.png image file
theghost.86it.us.txt image file
toolbox.png image file
tree-L.gif image file
tree-T.gif image file
white.png image file
white_e0dadc.png image file
white_eeeeee.png image file
white_eeeeeer.png image file
white_paper.png image file

modules/Titanium_SandBox/includes Module Sub Folder

modules/Titanium_SandBox/js Module Sub Folder

modules/Titanium_SandBox/songs Module Sub Folder

modules/Titanium_SandBox/project_file_descriptions Module Sub Folder

Total File Count : 57


Google Sitemap
This site is cached. CLICK HERE TO UPDATE CACHE
BlackJack Theme v1.0 © 2022
[ About Us ] - [ Disclaimer Statement ] - [ Privacy Statement ] - [ Terms of Use ]
MySQL Database Server: 10.3.39-MariaDB
Page Generation: 0.03 Seconds | Memory Usage: 592.66 KB | DB Queries: 20
Do Not Click