Displaying 1 - 20 of 79
β¦ automation using the Drupal #AI module -- automatically tag your articles. With the AI module, its AI Automators β¦ integrations, the great thing is you can easily edit the tags later if you want to highlight something specific, or if β¦
β¦ 05/16/2017 - 20:38 As I write, we're in the midst of a big Ransomware attack. Millions of computers have been infected, β¦ It's only a matter of time before there's a wave of Ransomware attacks on web hosts. If your site gets encrypted β¦
β¦ files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an application set β¦ Simple. Just check it out: cd public_html/dojo git tag # shows you a list of available tags git checkout β¦ with your changes. Also note that when you check out a tag, you don't necessarily get a tracking branch, so don't β¦
β¦ botnets who will help you target an organization for a Ransomware attack -- all you have to do is press the button, β¦ botnets who will help you target an organization for a Ransomware attack -- all you have to do is press the button, β¦
β¦ on master is if we have to roll back to a previous release tag, if something truly went wrong. Staging is where things β¦ Next it's a matter of doing the production deployment: Tag current production code commit Back up current production β¦
β¦ to a new point release of Drupal means merging the new tag into our branch. Then we've written a script to update β¦ and the development copy on develop. And it created a git tag for the particular release. On production, we have β¦ back to development and re-roll the release. git log/git tag -- identify the current state of the code base -- should β¦
β¦ Once the dev site is updated, we create a new release tag and push it into our central git repository, where β¦ regular backups of the files. We do a final snapshot/tag of the production code base, then pull down the new β¦ Once the dev site is updated, we create a new release tag and push it into our central git repository, where β¦
β¦ and an attacker deletes everything (or something) in it Ransomware that gains access to your credentials, and β¦ addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> β¦
β¦ able to identify several big wins, such as: setup meta tag module, disabling php filters, fixing staff directory β¦ able to identify several big wins, such as: setup meta tag module, disabling php filters, fixing staff directory β¦
β¦ spammy messages, and for mail that gets through, tag it with a SpamAssassin score so that mail delivery agents β¦ spammy messages, and for mail that gets through, tag it with a SpamAssassin score so that mail delivery agents β¦
β¦ From the code above, you can see we have a paragraph tag and JavaScript code. The role of the JavaScript code is β¦ of the current user's open tab, and create a new tag (if you want). This is a dangerous tool, so if it falls β¦ From the code above, you can see we have a paragraph tag and JavaScript code. The role of the JavaScript code is β¦
β¦ this does is it creates a URL structure based on how you tag an individual story. For example, you might have one β¦ this does is it creates a URL structure based on how you tag an individual story. For example, you might have one β¦
β¦ you would expect it to. Comments. I've left Drupal's core comment system on, which provides a handy place to log things β¦ Was it the overall complexity and learning curve? Thanks. Reply Submitted by John Locke on Thu, 06/07/2012 - 15:41 In β¦
β¦ of data (you lose access to something you need -- e.g. ransomware, hardware failure without sufficient backups, etc) β¦ addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> β¦ of data (you lose access to something you need -- e.g. ransomware, hardware failure without sufficient backups, etc) β¦
β¦ rules coming out regularly. We have SpamAssassin set to tag all messages, and reject those that have a score higher β¦ rules coming out regularly. We have SpamAssassin set to tag all messages, and reject those that have a score higher β¦
β¦ insecure browsers to form a botnet, or possibly even do a ransomware attack. The first line of defense here is backups, β¦ addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> β¦ insecure browsers to form a botnet, or possibly even do a ransomware attack. The first line of defense here is backups, β¦
β¦ and the final version number is applied and a matching git tag is created. Then the CI system looks up the deployment β¦ and the final version number is applied and a matching git tag is created. Then the CI system looks up the deployment β¦
β¦ What's a Framework? Submitted by John Locke on Tue, 09/01/2009 - 22:53 I get this question all the time: What's β¦ you deploy a system designed for making it easy to publish blog posts, you're not likely going to find it useful for β¦
β¦ pages are linked correctly, pictures and pages have been βtaggedβ with information about them, and the site can be β¦ world of SEO, they cannot just put terms on their page and tag pictures and be done with itβthey have to walk a mile in β¦ addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> β¦
β¦ priority: 600 } The crucial part here is the tag -- by registering the service as a β¦ priority: 600 } The crucial part here is the tag -- by registering the service as a β¦