Search Content

Displaying 1 - 20 of 79

… automation using the Drupal #AI module -- automatically tag your articles. With the AI module, its AI Automators … integrations, the great thing is you can easily edit the tags later if you want to highlight something specific, or if …

… 05/16/2017 - 20:38 As I write, we're in the midst of a big Ransomware attack. Millions of computers have been infected, … It's only a matter of time before there's a wave of Ransomware attacks on web hosts. If your site gets encrypted …

… files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an application set … Simple. Just check it out: cd public_html/dojo git tag # shows you a list of available tags git checkout … with your changes. Also note that when you check out a tag, you don't necessarily get a tracking branch, so don't …

… botnets who will help you target an organization for a Ransomware attack -- all you have to do is press the button, … botnets who will help you target an organization for a Ransomware attack -- all you have to do is press the button, …

… on master is if we have to roll back to a previous release tag, if something truly went wrong. Staging is where things … Next it's a matter of doing the production deployment: Tag current production code commit Back up current production …

… to a new point release of Drupal means merging the new tag into our branch. Then we've written a script to update … and the development copy on develop. And it created a git tag for the particular release. On production, we have … back to development and re-roll the release. git log/git tag -- identify the current state of the code base -- should …

… Once the dev site is updated, we create a new release tag and push it into our central git repository, where … regular backups of the files. We do a final snapshot/tag of the production code base, then pull down the new … Once the dev site is updated, we create a new release tag and push it into our central git repository, where …

… and an attacker deletes everything (or something) in it Ransomware that gains access to your credentials, and … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… able to identify several big wins, such as: setup meta tag module, disabling php filters, fixing staff directory … able to identify several big wins, such as: setup meta tag module, disabling php filters, fixing staff directory …

… spammy messages, and for mail that gets through, tag it with a SpamAssassin score so that mail delivery agents … spammy messages, and for mail that gets through, tag it with a SpamAssassin score so that mail delivery agents …

… From the code above, you can see we have a paragraph tag and JavaScript code. The role of the JavaScript code is … of the current user's open tab, and create a new tag (if you want). This is a dangerous tool, so if it falls … From the code above, you can see we have a paragraph tag and JavaScript code. The role of the JavaScript code is …

… this does is it creates a URL structure based on how you tag an individual story. For example, you might have one … this does is it creates a URL structure based on how you tag an individual story. For example, you might have one …

… you would expect it to. Comments. I've left Drupal's core comment system on, which provides a handy place to log things … Was it the overall complexity and learning curve? Thanks. Reply Submitted by John Locke on Thu, 06/07/2012 - 15:41 In …

… of data (you lose access to something you need -- e.g. ransomware, hardware failure without sufficient backups, etc) … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> … of data (you lose access to something you need -- e.g. ransomware, hardware failure without sufficient backups, etc) …

… rules coming out regularly. We have SpamAssassin set to tag all messages, and reject those that have a score higher … rules coming out regularly. We have SpamAssassin set to tag all messages, and reject those that have a score higher …

… insecure browsers to form a botnet, or possibly even do a ransomware attack. The first line of defense here is backups, … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> … insecure browsers to form a botnet, or possibly even do a ransomware attack. The first line of defense here is backups, …

… and the final version number is applied and a matching git tag is created. Then the CI system looks up the deployment … and the final version number is applied and a matching git tag is created. Then the CI system looks up the deployment …

… What's a Framework? Submitted by John Locke on Tue, 09/01/2009 - 22:53 I get this question all the time: What's … you deploy a system designed for making it easy to publish blog posts, you're not likely going to find it useful for …

… pages are linked correctly, pictures and pages have been β€œtagged” with information about them, and the site can be … world of SEO, they cannot just put terms on their page and tag pictures and be done with itβ€”they have to walk a mile in … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… priority: 600 } The crucial part here is the tag -- by registering the service as a … priority: 600 } The crucial part here is the tag -- by registering the service as a …