Skip to main content


Showing posts from October, 2015

Error: Element Style is Missing Required Attribute Scoped

A professional web developer always ensure if his website has any HTML error before delivering it to the client. I too do it once the coding is finished. This post explains one error code I received while validating the HTML code. As I progress HTML validation with my websites, I met a new error "Error: Element style is missing required attribute scoped". Validator showed the lines where this error present. While checking the code I found the following lines.

<style >blockquote{clear: both;font-style: italic;margin-left: 10px;margin-right: 10px;position: relative;border: 0px;font-size: 20px;line-height: 200%;font-weight: light;width: 100%;font-family: 'Source Sans Pro',Helvetica,Arial,sans-serif;text-align: center;}</style>

The screenshot of the error message is shown below.

<style> is considered as part of CSS and anything written in it will be applied to the whole document. However, if we use the attribute scoped, the style applies only to its pare…

Element div not Allowed As Child of Element Span in this Context

Today morning I tested some of my websites using W3 validator ( to check whether they have any HTML errors. They were developed by a freelance HTML developer hired online. One website showed an error - "Error: Element div not allowed as child of element span in this context. (Suppressing further errors from this subtree)". This is one of the easiest error we can fix and it  happen by a web developer who doesn't follow the basic rule of never put block-level elements inside inline elements. While testing the code I found the following lines which created the error.

<span class="mob-menu-toggle" data-target="#navbarCollapse" data-toggle="collapse"> <div id="nav-icon" > <span></span> <span></span> <span></span> <span></span> </div> </span>
Here, the block level element …

Prevent Malicious User Inputs In PHP Form

A professional website always must have a way to receive user inputs either in the form of a comment column or in the form of a user input form. It is a must for  successful websites to receive the feedback from their users but some malicious persons use this option to inject malicious scripts to the website. If the data entered by the user is directly inserted in to database, the situation is very critical. Luckily, PHP has some built in functions to validate the data inserted by a user using user input form. Before explaining those functions, it is better understand the effects of tricky external credentials.

Effects of Malicious User Inputs on a Website
Though a PHP address form is intended to receive user details like name, address etc, it will take every strings submitted unless we don't implement strict validation. If someone enters a script instead of name, it is possible that the form will accept it unless there is a validation. It will be extremely dangerous if we use t…

Cloud Computing Advantages and Disadvantages

The buzzword of the moment is “cloud computing,” and competition is stiff to attract users to the variety of cloud services available. Simply put, cloud computing is the idea of accessing data storage and applications at a remote site over the Internet, rather than from a local network. In this article we look at the major advantages and disadvantages of using cloud computing for a company. We cannot avoid the importance of cloud computing and we know it is the future. At the same time we must of aware of the risks in using cloud computing to store sensitive data of a company or institution. Final decision to use cloud computing for a company should fully depends on the detailed analysis on the risks and advantages of this new technology.

According to Gartner, one-third of all consumer data will be in the cloud by 2016, compared to 7% today.1 Microsoft has predicted that 74% of small and medium-sized businesses will use at least one cloud service by 2014.2

Most consumers have had a ta…