As you start to use Wireshark, you will realize that there are a wide variety of things that you can do with it. This article by Abhinav Singh, author of Instant Wireshark Starter [Instant], will teach you all about working with packet streams, the most commonly performed tasks and most commonly used feature in Wireshark.Read Wireshark: Working with Packet Streams in full
Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both. What we must do is to solidify your WordPress and other logins so you can securely administrate while keeping your data and credentials flying well under the radar. We'll put the best web protocols to work, along with added defenses, chiefly from Apache.
In this article by Olly Connelly, author of WordPress 3.0 Ultimate Security, we will cover:
- IP deny with mod_access
- Password protect directories
- Authentication with mod_auth
- Better passwords with mod_auth_digest
- More authentication methods
Many local and online risks double up to threaten sites and servers as well, and in some cases the opposite is true. With our web assets though, given their constant availability and valuable prizes for the successful assailant, malicious possibilities, and the temptation to exploit those rocket our subject’s risk factor, off the chart, to a sky-high level.
In this article by Olly Connelly, author of WordPress 3.0 Ultimate Security, we will cover:
- Sizing up vulnerabilities to WordPress and its third party code
- Addressing the frailties of and attacks to your server-side environment
It stands to reason that we can't properly secure a WordPress site until we have a heads-up on its vulnerabilities and the threats it faces. So let's kick off by ensuring awareness.
In this article by Olly Connelly, author of WordPress 3.0 Ultimate Security, we'll set the scene by introducing the hackers and their tricks and considering how the former plies the latter against a site, whether directly or indirectly:
- Knowing the enemy, the variety of mindset, and the levels of skill
- Considering physical security and the threat from social engineering
- Weighing up OS security, allow vs. deny policies and open vs. closed source
- Mulling over malware in its many shapes and forms
- Assessing risks from local devices such as PCs and routers
- Treading carefully in the malicious minefield that is the web
WordPress is a popular content management system (CMS), most renowned for its use as a blogging / publishing application. According to usage statistics tracker, BuiltWith (http://builtWith.com), WordPress is considered to be the most popular blogging software on the planet—not bad for something that has only been around officially since 2003.
In this article by Brian Bondari and Everett Griffiths, authors of WordPress 3 Plugin Development Essentials, we will learn about a special type of WordPress plugin: the widget. The architecture of widgets has undergone a radical change starting with the release of WordPress 2.8, so now we must talk about Object Oriented programming. We will learn a bit about its power as we extend the WP_Widget class to create our widget. We will also learn how to create a preference page in the manager so we can store our plugin's configuration details.Read WordPress 3: Building a Widget in full
In this article by Paul Thewlis, author of WordPress 3 For Business Bloggers, we'll look at one of the most important aspects of your blog—design. We'll begin by considering some of the principles of good blog design. Even if your blog is already up and running, this article will allow you to critically evaluate its design and replace your current theme with a custom-designed one. This article includes:
- The principles of blog design
- How to implement your blog design using CSS and HTML
WordPress is a flexible and powerful tool that's ideal for creating both blog and non-blog websites. You can customize the features, incorporate your own design, and even write your own plug-ins with ease.
To celebrate the publication of the WordPress 3 Ultimate Security, Packt is offering a series of attractive discounts on all WordPress books.
* Buy any WordPress print book and get 20% off
* Buy any WordPress eBook and get 30% off
This offer will last for a limited period only. Grab your copy now !
WordPress is a powerful and effective open source web publishing platform that enables anyone, regardless of computer skills, to create and maintain a world-class website. Millions of people worldwide have adopted WordPress, and its popularity continues to increase.
The term black hat SEO generally refers to any manner by which visibility, rankings, or traffic is improved through illicit or forbidden techniques, tools, or methods.
In this article by Michael David, author of WordPress 3 Search Engine Optimization, we'll take a tour through the seedy side of SEO. We'll examine a wide range of black and gray hat techniques—and why it is imperative that you avoid them.Read WordPress: Avoiding the Black Hat Techniques in full
The BuddyPress (BP) Courseware plugin by ScholarPress transforms our WordPres site into a learning management system. This plugin provides educators with the ability to post and organize course content, assignments, bibliographies, and schedules. BP Courseware works by extending the BuddyPress group functionality. Each courseware-enabled group receives a courseware dashboard where teachers and students can quickly access and post course content. The BP Courseware plugin is ideal for managing multiple courses by the same instructor or for an entire academic department.
In this article by Adam D. Scott, author of the book WordPress for Education, we'll cover techniques to install and configure the BP Courseware plugin. Once the plugin is installed, we'll develop content for a sample courseware course by adding course information, posting assignments, grading student assignments, creating a bibliography, and managing the course calendar.Read Wordpress: Buddypress Courseware in full
What is the WordPress loop? The loop is a group of PHP instructions that retrieve posts from the database of your WordPress site and then displays them on the page. You can find the WordPress loop inside your themes, for example, inside index.php, single.php, or page. php. Any HTML or PHP code placed between the beginning of the loop and the end will be used for each post.
In this article by Ric Shreves, author of WordPress 3 Cookbook, we will cover:
- How to work with the WordPress loop
- How you can retrieve posts from a specific category
- How to control how many posts you display
- Retrieving posts by date
- Showing only those posts published today
- How to show posts published exactly one year ago
- How to set up and use multiple loops
An important part of Records Management is the concept of the record lifecycle. The lifecycle of a record is, in effect, a mini-workflow for managing the record. In addition to handling the workflow of the records lifecycle, standard Alfresco software also includes content management features like rules and workflow. In this article, we will look and see how some of these Alfresco features can be utilized alongside Records Management.
In this article, by Dick Weisinger, author of Alfresco 3 Records Management, specifically we will describe:
- Availability of Alfresco rules and workflow in Records Management
- How to specify events, actions, and filter criteria for Alfresco rules
- How to access and assign standard workflow templates within Alfresco
- How to use a graphical process designer to lay out workflow templates
- Detailed examples that demonstrate both Alfresco rules and workflow capabilities
This article by Soroush Falahati, the author of OpenNI Cookbook explains a working sample for controlling the mouse by hand. Here, we will write a working example for using nite::HandTracker.
This article will show you how to control the position of the mouse cursor using the NiTE hand tracker feature and how to simulate a click event.
We are going to use the Hand Raise gesture for the tracking of hands and the Click (push) gesture for the mouse click. Also, because of the low resolution of the depth output compared to the resolution of the monitor, which results in low accuracy of the hand tracker, we decided to move the mouse depending on its distance with the starting point. This is similar to how you control your mouse with a joystick.
This sample is Windows only because it uses the Microsoft Windows API.Read Working sample for controlling the mouse by hand in full
WF4 is a process engine, as well as a visual program language, shipped along with Microsoft .NET Framework 4.0. Traditionally, when we design a long-running application, we break a large application into lots of small code blocks to address the business logic and use a database to store the intermediate data. With the growing complexity of logic, managing code blocks and authoring logic workflows becomes difficult. Now, with WF4, we can design and create distributed, long-running programs easily.
This article by Andrew Zhu, author of Microsoft Windows Workflow Foundation 4 cookbook, provides recipes that will help us understand basic information about WF4 programming like:
- Creating the first WF program: HelloWorkflow
- Creating a WF program with C# code
- Initializing a WF program with InArguments
- Creating a WF program with OutArgument
- Creating a WF Program with InOutArgument
- Using variable in WF program
- Running a WF program asynchronously
- Customizing a MyReadLine activity with bookmark
- Converting WF program instance to XAML
- Loading up a WF program from a XAML file
In this article, we'll see how to create a Neo4j database. Onofrio Panzarino, the author of this book, Learning Cypher, is a programmer with 15 years experience with various languages (mostly with Java), platforms, and technologies. He has gained a lot of experience with graph databases, particularly with Neo4j. This article throws light on setting up a new Neo4j database.Read Working with a Neo4j Embedded Database in full
Coherence filters are great when you need to retrieve a subset of objects from the cache based on a certain criteria, but there are cases when you want to process these objects as well in order to return a single result. Coherence aggregators help to achieve exactly that.
In this article by Aleksandar Seovic, Mark Falco and Patrick Peralta, authors of Oracle Coherence 3.5, we will cover:
- Built-in aggregators
- Using aggregators
- Implementing LookupValuesAggregator
The article by Sigismondo Boschi and Gabriele Santomaggio, the authors of RabbitMQ Cookbook, introduces the basic concepts of AMQP, the Advanced Message Queuing Protocol, on which RabbitMQ is based. It shows how the fire-and-forget messaging model works and how to use it from clients.Read Working with AMQP in full
In this article by Vincent Bumgarner, author of Implementing Splunk: Big Data Reporting and Development for Operational Intelligence , we will explore what makes up a Splunk app. We will:
Inspect included apps
Install apps from Splunkbase
Build our own app
Customize app navigation
Customize app look and feel
In this article by Joydip Kanjilal, we will discuss the ASP.NET DataList control which can be used to display a list of repeated data items. We will learn about the following:
- Using the DataList control
- Binding images to a DataList control dynamically
- Displaying data using the DataList control
- Selecting, editing and deleting data using this control
- Handling the DataList control events