Displaying 1 - 20 of 82
β¦ Heartbleed - Do you need to do anything? Submitted by John β¦ on Sat, 04/12/2014 - 15:46 Everybody is writing about Heartbleed this week. The reason? It probably affects more β¦
β¦ automation using the Drupal #AI module -- automatically tag your articles. With the AI module, its AI Automators β¦ integrations, the great thing is you can easily edit the tags later if you want to highlight something specific, or if β¦
β¦ systems -- our bookkeeping software, our secondary backup system, some statistics packages, and a few other β¦ us. The ironic thing about this is that our secondary backup system does actually run under CGI, so if this had β¦
β¦ files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an application set β¦ public_html/dojo git tag # shows you a list of available tags git checkout svn/release-1.3.2 # checks out Dojo version β¦ Dojo and non-built Dojo. With a build, you need script tags to load your build layers, and, obviously, they need to β¦
β¦ attack can reveal information you want to keep secret -- mainly your passwords, and security keys widely used to β¦ who might get compromised anyway? We think there are two main things to think about when it comes to this type of β¦ have become higher. When it comes to a website, the three main risks to consider are: Loss of service (Denial of β¦
β¦ on master is if we have to roll back to a previous release tag, if something truly went wrong. Staging is where things β¦ Next it's a matter of doing the production deployment: Tag current production code commit Back up current production β¦
β¦ to roll back changes that go awry. Especially if you use tags effectively. For managing lots of related websites, it's β¦ to a new point release of Drupal means merging the new tag into our branch. Then we've written a script to update β¦ minutes of entirely bad user experience...) Production tags and deployment We don't automatically deploy to β¦
β¦ security might be fine if you do no online banking, never shop online, are at the end of your career, and are not β¦ security might be fine if you do no online banking, never shop online, are at the end of your career, and are not β¦
β¦ Once the dev site is updated, we create a new release tag and push it into our central git repository, where β¦ regular backups of the files. We do a final snapshot/tag of the production code base, then pull down the new β¦ Once the dev site is updated, we create a new release tag and push it into our central git repository, where β¦
β¦ you Pencol!! http://www.freelock.com/testimonials/1133 In 2019 we embarked on migrating their Athletics site from β¦ you Pencol!! http://www.freelock.com/testimonials/1133 In 2019 we embarked on migrating their Athletics site from β¦
β¦ As a provider of these services, we recommend hiring a shop with this expertise to get it running quickly and β¦ As a provider of these services, we recommend hiring a shop with this expertise to get it running quickly and β¦
β¦ cost, but because of the responsibilities you take on. Heartbleed? Shellshock? You now need to pay attention to the β¦ cost, but because of the responsibilities you take on. Heartbleed? Shellshock? You now need to pay attention to the β¦
β¦ Stored Cross-Site Scripting Vulnerabilities (http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5084.php) β¦ (browser). From the following examples (taken from http://www.acunetix.com/blog/web-security-zone/dom-xss/), you can β¦ You can exploit this code with the following link: http://www.attacker.com/domxsspage.html?<script>the malicious β¦
β¦ this does is it creates a URL structure based on how you tag an individual story. For example, you might have one β¦ this does is it creates a URL structure based on how you tag an individual story. For example, you might have one β¦
β¦ people. So a person is a contact in my system. You can tag that person as a customer, lead, prospect, whatever you β¦ We attach an expected value of that opportunity, and tag them with a sales stage. This becomes our sales pipeline, β¦ people. So a person is a contact in my system. You can tag that person as a customer, lead, prospect, whatever you β¦
β¦ rules coming out regularly. We have SpamAssassin set to tag all messages, and reject those that have a score higher β¦ rules coming out regularly. We have SpamAssassin set to tag all messages, and reject those that have a score higher β¦
β¦ pages are linked correctly, pictures and pages have been βtaggedβ with information about them, and the site can be β¦ world of SEO, they cannot just put terms on their page and tag pictures and be done with itβthey have to walk a mile in β¦ addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> β¦
β¦ and the final version number is applied and a matching git tag is created. Then the CI system looks up the deployment β¦ and the final version number is applied and a matching git tag is created. Then the CI system looks up the deployment β¦
β¦ taxonomy system that can be used to categorize and tag content The "Forms API" to make it simple to create, β¦ taxonomy system that can be used to categorize and tag content The "Forms API" to make it simple to create, β¦
β¦ analytics. Check out our approach to data ingestion, meta-tagging, and data models, and how we build those insights β¦ addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> β¦ analytics. Check out our approach to data ingestion, meta-tagging, and data models, and how we build those insights β¦