Tips on Writing WordPress Plugins
A better way to use PDF files online
The Latest and Greatest php.ini
Grab the latest php.ini developmental version and discover new or previously hidden php runtime configuration settings... ahead of everyone else!
Top Javascript Code Snippets for 2007
Pen-testing Security Tools
While testing the exploitability of your target and mapping out vulnerabilities it is important to gain access inside the targets defenses so that you can establish an internal foothold like a owned box or switch. This is so you can use a tool to discover the packet-filtering being used, and literally map out the firewall/IDS rules. Needless to say that really provides you with a lot more complete vulnerability assessment to help discover more weak spots in the system.
SEO with Robots.txt
CSS Background Image Sprites
The REAL Way to Optimize AdSense
Apache HTTPD Google CSE
Apache Documentation Google Custom Search Engine is a great place to go looking for mod_rewrite, .htaccess, and other Apache HTTPD related topics.