Search Content

Displaying 1 - 20 of 82

… Heartbleed - Do you need to do anything? Submitted by John … on Sat, 04/12/2014 - 15:46 Everybody is writing about Heartbleed this week. The reason? It probably affects more …

… automation using the Drupal #AI module -- automatically tag your articles. With the AI module, its AI Automators … integrations, the great thing is you can easily edit the tags later if you want to highlight something specific, or if …

… systems -- our bookkeeping software, our secondary backup system, some statistics packages, and a few other … us. The ironic thing about this is that our secondary backup system does actually run under CGI, so if this had …

… files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an application set … public_html/dojo git tag # shows you a list of available tags git checkout svn/release-1.3.2 # checks out Dojo version … Dojo and non-built Dojo. With a build, you need script tags to load your build layers, and, obviously, they need to …

… attack can reveal information you want to keep secret -- mainly your passwords, and security keys widely used to … who might get compromised anyway? We think there are two main things to think about when it comes to this type of … have become higher. When it comes to a website, the three main risks to consider are: Loss of service (Denial of …

… on master is if we have to roll back to a previous release tag, if something truly went wrong. Staging is where things … Next it's a matter of doing the production deployment: Tag current production code commit Back up current production …

… to roll back changes that go awry. Especially if you use tags effectively. For managing lots of related websites, it's … to a new point release of Drupal means merging the new tag into our branch. Then we've written a script to update … minutes of entirely bad user experience...) Production tags and deployment We don't automatically deploy to …

… security might be fine if you do no online banking, never shop online, are at the end of your career, and are not … security might be fine if you do no online banking, never shop online, are at the end of your career, and are not …

… Once the dev site is updated, we create a new release tag and push it into our central git repository, where … regular backups of the files. We do a final snapshot/tag of the production code base, then pull down the new … Once the dev site is updated, we create a new release tag and push it into our central git repository, where …

… you Pencol!! http://www.freelock.com/testimonials/1133 In 2019 we embarked on migrating their Athletics site from … you Pencol!! http://www.freelock.com/testimonials/1133 In 2019 we embarked on migrating their Athletics site from …

… As a provider of these services, we recommend hiring a shop with this expertise to get it running quickly and … As a provider of these services, we recommend hiring a shop with this expertise to get it running quickly and …

… cost, but because of the responsibilities you take on. Heartbleed? Shellshock? You now need to pay attention to the … cost, but because of the responsibilities you take on. Heartbleed? Shellshock? You now need to pay attention to the …

… Stored Cross-Site Scripting Vulnerabilities (http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5084.php) … (browser). From the following examples (taken from http://www.acunetix.com/blog/web-security-zone/dom-xss/), you can … You can exploit this code with the following link: http://www.attacker.com/domxsspage.html?<script>the malicious …

… this does is it creates a URL structure based on how you tag an individual story. For example, you might have one … this does is it creates a URL structure based on how you tag an individual story. For example, you might have one …

… people. So a person is a contact in my system. You can tag that person as a customer, lead, prospect, whatever you … We attach an expected value of that opportunity, and tag them with a sales stage. This becomes our sales pipeline, … people. So a person is a contact in my system. You can tag that person as a customer, lead, prospect, whatever you …

… rules coming out regularly. We have SpamAssassin set to tag all messages, and reject those that have a score higher … rules coming out regularly. We have SpamAssassin set to tag all messages, and reject those that have a score higher …

… pages are linked correctly, pictures and pages have been β€œtagged” with information about them, and the site can be … world of SEO, they cannot just put terms on their page and tag pictures and be done with itβ€”they have to walk a mile in … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… and the final version number is applied and a matching git tag is created. Then the CI system looks up the deployment … and the final version number is applied and a matching git tag is created. Then the CI system looks up the deployment …

… taxonomy system that can be used to categorize and tag content The "Forms API" to make it simple to create, … taxonomy system that can be used to categorize and tag content The "Forms API" to make it simple to create, …

… analytics.  Check out our approach to data ingestion, meta-tagging, and data models, and how we build those insights … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> … analytics.  Check out our approach to data ingestion, meta-tagging, and data models, and how we build those insights …