You saw, that your mysql disk, using /var/lib/mysql is full. So, you need to know how to free some space and clean up the disk. Usually, you can safely remove the old binlogs.
Sometimes you could not create Mysql dump because one or several tables corrupted. Then obviously it should be somehow restored. The Mysql and Maria have some standard tools for restoring crashed tables.
How to check if a customer is logged in?
Let’s discuss, how to check if the customer is logged in at any class (controller, model, block, etc) or at the template.
The short answer is you should not use the ObjectManager directly at all. It is a bad practice, and lets talk why.
Magento 2 + Modernizr
Modernizr is needed to determine which of the JS, HTML and CSS capabilities the client browser can handle and which cannot. It is very useful to use its functionality in Magento.
Do you also get this annoying notification that you need to sign in to the network? It is not only annoying but also indicates that the Internet connection is actually broken. And you cannot receive any messages, you cannot use the Internet at all. You need constantly press the Use this network as is option. This is very annoying.
Images on your site are very important, it has said a lot about already. Internet users often pay attention to the illustrated sites and ignore the ones where there is only the text. This article focuses on how to correctly place the images on your site that they are guaranteed to be indexed by Google or Yandex.
Some web applications do not have a common template output, to which you could simply insert the tracking code (Google Analytics or Yandex Metrika). In such applications, HTML-pages are generated in different ways and patterns. To insert the tracking code into such a system, you can use the Apache HTTPD.
Imagine that you have developed a site that has a good attendance. Then the attacker will want to embed your web site or any of its page into his frame, to manipulate a data, that users enter thinking if they are on your site. This type of attack is known as Clickjacking.
There is a simplified example of malicious code that uses your site:
Using PHP you can generate VCF-files, which contain contact data, suitable for Outlook. This article briefly discusses the insertion of image (avatar) to this file.