In this article by Richard Carter, we will learn social bookmarking.
Social bookmarking allows people to "bookmark", or make a note of, the websites they like or find useful, and share these bookmarks with other social bookmarkers while surfing the Internet.Read Social Bookmarking - MediaWiki in full
Blogging is not done in a vacuum. We are all looking for ways to attract readers and share our message. Social bookmarking will help you find new readers and measure successful posts. In this part of the article by Lee Jordan, we will see the working of Social Bookmarking. We will also discuss how to add Bookmarks to Blogs.Read Social Bookmarking in Blogger: Part 1 in full
In the previous part of the article we saw the Working of Social Bookmarking and discussed how to Add Bookmarks to Blogs.
In this part by Lee Jordan, we will continue with the addition of Bookmarks to Blogs and see how to attract readers with Links.Read Social Bookmarking in Blogger: Part 2 in full
In this article by Vladimir Prelovac, we will learn to create our first functional WordPress plugin and learn how to interact with the WordPress API (this is the WordPress interface to PHP) on the way. The knowledge you will gain in this article alone will allow you to write a lot of similar plugins.
Let's get moving! In this article, you will learn:
- Creating a new plugin and having it displayed in the plugins admin panel
- Checking the WordPress version and control activation of the plugin
- Accessing API features—for example the title and permalink URL of each post
- Using WordPress hooks to execute your plugin code when it's needed
- Using conditional tags to control the flow of your plugins
This article, written by Rahul Singh Patel, author of the book Kali Linux Social Engineering, introduces social engineering and attacks that currently the industry is facing in the form of e-mail, Advance Persistent Threats (APT).
Social refers to our day-to-day lives, which include both personal and professional aspects; while engineering means a defined way of performing a task by following certain steps to achieving the target. Social engineering is a term that describes a nontechnical intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.Read Social Engineering Attacks in full
In this article by Michael Kuhlmann we'll be learning the following topics:
- Why customer value proposition, sustainability, and timing matter
- How to set up memberships and make category-specific content restrictions applicable only to non-members
- Key opportunities to mention your other social networking accounts on our site
- How to implement page-specific custom scripts like a countdown timer
- More ways to reward site members for using our site
Let's bring some of these ideas to fruition.Read Social Media for Wordpress: VIP Memberships in full
This article by Richard Carter states that our theming of Magento does not have to stop at changing the way it looks. We can also add aspects of social media to it, such as:
- Integrating your Magento store with Twitter
- Improving your store's customer service
- Using social bookmarking tools such as AddThis to help your customers spread the word about your store across the Internet
With so many e-commerce stores on the Internet, using social media can make a huge difference to your store's fortunes. It can also increase your potential customers and ensure that customers continue to come back.Read Social Media in Magento in full
This article by Bill Fitzgerald, gives an overview of building user profiles. The article begins with the core profile module, and then goes deeper to show how to extend user profiles using the flexible Content Construction Kit and custom fields.
Read Social Networks and Extending the User Profile in Drupal: Part-1 in full
In this article by Monika Agarwal, the author of the book Metasploit Penetration Testing Cookbook Second Edition, we will cover:
- Getting started with the Social-Engineer Toolkit(SET)
- Working with the SET config file
- Working with the spear-phishing attack vector
- Website attack vectors
- Working with the multi-attack web method
- Infectious media generator
Documentation—if there is one word that installs fear in most developers, it must be this one. No one in their right mind would argue the value of documentation, but it is the actual act of writing it that concerns developers so.
The secret of creating good documentation is to make the process of doing so as painless as possible, and if we are lucky maybe even attractive, to the developers. The only practical way to achieve that is to reduce friction. The last thing we need when we are in middle of fixing a bug is to wrestle with our word processor, or even worse try to find the right document to update.
David J Murphy illustrates in this article, how Trac can used for the purpose of documentation.Read Software Documentation with Trac in full
The launch of Windows XP in 2001 heralded the long-awaited transition of consumer-orientated editions of Windows to the NT codebase. Microsoft designed the Windows Application Compatibility Infrastructure as part of Windows XP to help system administrators and home users solve compatibility problems with applications that were designed to run in Windows 98 or earlier versions of the 9x range.
In this article by Russell Smith, author of Least Privilege Security for Windows 7, Vista and XP, we will learn:
- How the Application Compatibility Infrastructure uses shims to modify incompatible applications on the fly
- Why using shims provides the best balance between compatibility and security
- How to create shims using Application Compatibility Toolkit 5.5
- Distributing compatibility databases to devices across the enterprise
This article by Russell Smith, author of Least Privilege Security for Windows 7, Vista and XP, includes information about tools and techniques that can be used to solve Least Privilege Security problems. Specifically, we will use third-party solution to configure administrative privileges for applications and Windows processes on-the-fly. Privilege Guard is a third-party solution, from Microsoft Gold Partner Avecto, that allows system administrators to dynamically add or remove privileges by modifying the logged in user's access token as it's assigned to new processes.Read Solving LUA Problems with Avecto Privilege Guard in full
Modeling book sales is not a big deal, you just need a sales fact and a book dimension, and other dimensions, such as date dimension. From this model, you can analyze daily book sales.
But, what if a book is written by more than one writer and an individual writer writes more than one book, i.e. relationship of book to writer is many to many? How would you enhance the existing book sales dimensional model, which has book granularity, to also handle sales analysis by individual writer, i.e. analysis at writer granularity?
In this article by Djoni Darmawikarta, we will discuss the two possible dimensional modeling solutions to handle many-to-many relationship.Read Solving Many-to-Many Relationship in Dimensional Modeling in full
To celebrate the recent publication of the Microsoft Dynamics GP 2010 Reporting book, Packt is pleased to announce a series of attractive discounts on our wide range of Dynamics books. For more information click here.
Dynamics GP offers a great deal of options and additional modules surrounding the core distribution modules, using which some advanced workflow and functionality can be achieved when needed. Inventory, Sales Order Processing, and Purchase Order Processing are commonly referred to as the Distribution Modules. These modules integrate with each other and with the other modules in Dynamics GP and are the modules where the transactions pertaining to inventory quantities and costs, purchases, sales, and transfers are entered.
In this article by Victoria Yudin, author of Microsoft Dynamics GP 2010 Implementation, we will cover basic setup for the Sales Order Processing (SOP) module.Read SOP Module Setup in Microsoft Dynamics GP in full
In this article, by Johannes Stein, author of the book Sparrow iOS Game Framework Beginner's Guide, we will begin setting up our game. We will learn about what to consider when targeting different devices, and we will take the first step in setting up our game. This includes creating the scenes we need and displaying static images on the screen.Read Sparrow iOS Game Framework - The Basics of Our Game in full
In this article by Artan Sinani, author of the book Learning Bing Maps API, iwe will learn geocoding setting up automated jobs on the Bing Maps servers. We will also learn the techniques of monitoring the jobs, and on their completion, parsing the response.
The topics covered in this article are as follows:
- Geocoding dataflow input data
- The job
- Getting job status
This article by Brett Lantz, author of Machine Learning with R, covers techniques that may not apply to every machine learning project, but could prove useful for certain types of work.Read Specialized Machine Learning Topics in full
Search is by far the most important feature of an application where data is stored and retrieved. If it hadn't been for search, Google wouldn't exist, so we can imagine the importance of search in the computing world. In today's world, search is an integral part of any application; a reliable search engine like Sphinx Search can be the difference between running a successful and unsuccessful business.
This article covers some of the most frequently asked questions on Sphinx Search.Read Sphinx Search FAQs in full