Solved

Activate php_gd2

Posted on 2006-12-01
9
257 Views
Last Modified: 2008-03-17
How do ,I activate Activate php_gd2 ?

Thank u.
0
Comment
Question by:matthew016
  • 6
  • 3
9 Comments
 
LVL 29

Expert Comment

by:TeRReF
ID: 18057146
What OS are you using?
0
 
LVL 9

Author Comment

by:matthew016
ID: 18057163
Windows, and for deploying Linux
0
 
LVL 29

Expert Comment

by:TeRReF
ID: 18057179
Under Windows:
Edit your php.ini and remove the ; before this line:
;extension=php_gd2.dll

Then make sure the php_gd2.dll is located in your extension path. You can find your extension path by creating a php page with this in it:
<?php
  phpinfo();
?>

Then run it and find extension path


For Linux it depends on your Linux flavour..
0
 
LVL 29

Expert Comment

by:TeRReF
ID: 18057182
Don't forget to restart your webserver after you've made the changes!
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 9

Author Comment

by:matthew016
ID: 18057192
Where can I see for gd2 in the page that contains all the info.
I did a search on gd2 but no results
0
 
LVL 29

Accepted Solution

by:
TeRReF earned 500 total points
ID: 18057209
No, you have to look for your extension path and copy the dll file there... (if it's not there yet of course)

You can search for the file with explorer to locate it on your local filesystem
0
 
LVL 29

Expert Comment

by:TeRReF
ID: 18057218
It's not listed as gd2 by the way (once it's enabled) but as gd (with version number 2.x)
0
 
LVL 9

Author Comment

by:matthew016
ID: 18057233
Thank u,
gd2 is to have more performance with images ?
0
 
LVL 29

Expert Comment

by:TeRReF
ID: 18057284
Yes, GD2 is the better choice for sure.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Encode a password 2 38
XSS cleaning when using ajax & json encode 5 38
Wordpress syntax error 1 28
regex expression 9 22
Generating table dynamically is the most common issue faced by php developers.... So it seems there is a need of an article that explains the basic concept of generating tables dynamically. It just requires a basic knowledge of html and little maths…
Foreword (July, 2015) Since I first wrote this article, years ago, a great many more people have begun using the internet.  They are coming online from every part of the globe, learning, reading, shopping and spending money at an ever-increasing ra…
The viewer will learn how to create and use a small PHP class to apply a watermark to an image. This video shows the viewer the setup for the PHP watermark as well as important coding language. Continue to Part 2 to learn the core code used in creat…
This tutorial will teach you the core code needed to finalize the addition of a watermark to your image. The viewer will use a small PHP class to learn and create a watermark.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now