WordPress is a powerful and effective open source web publishing platform that enables anyone, regardless of computer skills, to create and maintain a world-class website. Millions of people worldwide have adopted WordPress, and its popularity continues to increase.
The term black hat SEO generally refers to any manner by which visibility, rankings, or traffic is improved through illicit or forbidden techniques, tools, or methods.
In this article by Michael David, author of WordPress 3 Search Engine Optimization, we'll take a tour through the seedy side of SEO. We'll examine a wide range of black and gray hat techniques—and why it is imperative that you avoid them.Read WordPress: Avoiding the Black Hat Techniques in full
WordPress is a flexible and powerful tool that's ideal for creating both blog and non-blog websites. You can customize the features, incorporate your own design, and even write your own plug-ins with ease.
To celebrate the publication of the WordPress 3 Ultimate Security, Packt is offering a series of attractive discounts on all WordPress books.
* Buy any WordPress print book and get 20% off
* Buy any WordPress eBook and get 30% off
This offer will last for a limited period only. Grab your copy now !
In this article by Paul Thewlis, author of WordPress 3 For Business Bloggers, we'll look at one of the most important aspects of your blog—design. We'll begin by considering some of the principles of good blog design. Even if your blog is already up and running, this article will allow you to critically evaluate its design and replace your current theme with a custom-designed one. This article includes:
- The principles of blog design
- How to implement your blog design using CSS and HTML
WordPress is a popular content management system (CMS), most renowned for its use as a blogging / publishing application. According to usage statistics tracker, BuiltWith (http://builtWith.com), WordPress is considered to be the most popular blogging software on the planet—not bad for something that has only been around officially since 2003.
In this article by Brian Bondari and Everett Griffiths, authors of WordPress 3 Plugin Development Essentials, we will learn about a special type of WordPress plugin: the widget. The architecture of widgets has undergone a radical change starting with the release of WordPress 2.8, so now we must talk about Object Oriented programming. We will learn a bit about its power as we extend the WP_Widget class to create our widget. We will also learn how to create a preference page in the manager so we can store our plugin's configuration details.Read WordPress 3: Building a Widget in full
It stands to reason that we can't properly secure a WordPress site until we have a heads-up on its vulnerabilities and the threats it faces. So let's kick off by ensuring awareness.
In this article by Olly Connelly, author of WordPress 3.0 Ultimate Security, we'll set the scene by introducing the hackers and their tricks and considering how the former plies the latter against a site, whether directly or indirectly:
- Knowing the enemy, the variety of mindset, and the levels of skill
- Considering physical security and the threat from social engineering
- Weighing up OS security, allow vs. deny policies and open vs. closed source
- Mulling over malware in its many shapes and forms
- Assessing risks from local devices such as PCs and routers
- Treading carefully in the malicious minefield that is the web
Many local and online risks double up to threaten sites and servers as well, and in some cases the opposite is true. With our web assets though, given their constant availability and valuable prizes for the successful assailant, malicious possibilities, and the temptation to exploit those rocket our subject’s risk factor, off the chart, to a sky-high level.
In this article by Olly Connelly, author of WordPress 3.0 Ultimate Security, we will cover:
- Sizing up vulnerabilities to WordPress and its third party code
- Addressing the frailties of and attacks to your server-side environment
Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both. What we must do is to solidify your WordPress and other logins so you can securely administrate while keeping your data and credentials flying well under the radar. We'll put the best web protocols to work, along with added defenses, chiefly from Apache.
In this article by Olly Connelly, author of WordPress 3.0 Ultimate Security, we will cover:
- IP deny with mod_access
- Password protect directories
- Authentication with mod_auth
- Better passwords with mod_auth_digest
- More authentication methods
As you start to use Wireshark, you will realize that there are a wide variety of things that you can do with it. This article by Abhinav Singh, author of Instant Wireshark Starter [Instant], will teach you all about working with packet streams, the most commonly performed tasks and most commonly used feature in Wireshark.Read Wireshark: Working with Packet Streams in full
This article by Jayaram Krishnaswamy introduces the reader accustomed to working with the traditional graphic user interface in earlier versions of VB to Windows Presentation Foundation. Importantly, it introduces the reader to the XAML's declarative format and what it means in the design interface of VS 2008. WPF can do a great deal more than what is described in this article. The power of markup extensions such as declarative binding, dynamic resource, template binding and many others are not discussed. It is hoped that the reader will be up and running WPF projects based on his previous experience after reading this article.Read Windows Presentation Foundation Project - Basics of Working in full
In this article by Jonathan Marbutt and Robb Schiefer Jr., authors of Windows Phone 7 Silverlight Cookbook, we will take a deep dive into the location API for Windows Phone 7 by building an application to help navigate during travel and another to map the user's location.
In this article we will cover:
- Tracking latitude and longitude
- Tracking altitude, speed, and course
- Saving battery by using a location wisely
- Using location services with the emulator
- Mapping your location
The WiX toolset ships with several User Interface wizards that are ready to use out of the box. We'll briefly discuss each of the available sets and then move on to learning how to create your own from scratch. In this article by Nick Ramirez, author of the book WiX: A Developer's Guide to Windows Installer XML, you'll learn about:
- Adding dialogs into the InstallUISequence
- Linking one dialog to another to form a complete wizard
- Getting basic text and window styling working
- Including necessary dialogs like those needed to display errors
The development environment of choice in this article by Stefan Björnander is the Visual Studio from Microsoft. In this article we also study the Microsoft Foundation Classes (MFC).
- Visual Studio provides us with a few Wizards—tools that help us generate code. The Application Wizard creates an application framework (a skeleton application) to which we add the specific logic and behavior of our application.
- When developing a Windows application, the Document/View model comes in handy. The application is divided into a document object that holds the data and performs the logic, and one or more views that take care of user input and display information on the screen.
- When an event occurs (the user clicks the mouse, the window is resized) a message is sent to the application, it is caught by a view object and is passed on to the document object. There are hundreds of messages in the Windows system. However, we only catch those that interest us.
- The device context can be viewed both as a canvas to paint on and as a toolbox holding pens and brushes.
- When we finish an application, we may want it to occur in the same state when we launch it the next time. This can be archived by storing vital values in the registry.
- Serialization is an elegant way of storing and loading values to and from a file. The framework takes care of naming, opening, and closing the file, all we have to do is to fill in the unique values of the application.
- The cursor has different appearances on different occasions. There are several predefined cursors we can use.
Windows Azure Service Bus offers features that are not offered by any other cloud platform on the market. One important feature is the Service Bus that enables you to connect your on-premise services to Windows Azure services and beyond. The Access Control Service enables you to easily authenticate users without having to write complex authentication code ourselves. By using Windows Identity Framework (WIF) and supporting identity providers such as Live ID, Yahoo, and Facebook, it will be easy to use these identity providers as the main authentication mechanism in our own services.
In this article by Riccardo Becker, author of Windows Azure programming patterns for Start-ups, we will provide a systematic guide on how to integrate with Facebook. AppFabric also contains AppFabric applications, an easy way to develop and deploy composite applications. Another interesting feature is the caching feature that AppFabric offers.Read Windows Azure Service Bus: Key Features in full
The default configuration for Windows Azure Diagnostics captures some data but does not persist it. Consequently, the diagnostics configuration should be modified at role startup. In this article by Neil Mackenzie, author of Microsoft Windows Azure Development Cookbook, the Initializing the configuration of Windows Azure Diagnostics recipe, shows us how to do this programmatically, which is the normal way to do it. In the Using a configuration file with Windows Azure Diagnostics recipe, we see how to use a configuration file to do this, which is necessary in a VM role.Read Windows Azure Diagnostics: Initializing the Configuration and Using a Configuration File in full
Microsoft Windows PowerShell 3.0 First Look will ensure that you have a great overview of the numerous new features and changes found in the most recent version of the language. Through simple examples and succinct chapters, this book will quickly bring readers up to speed with need to know information about the newest version of PowerShell.
In this article by Adam Driscoll, author of Microsoft Windows PowerShell 3.0 First Look, we'll see:
- A selection of new cmdlets found in the core PowerShell modules
- A selection of new modules and cmdlets found in Windows 8 and Windows Server 2012
Many popular distributions, community-oriented and otherwise, take security very seriously. They have dedicated security teams that go over individual packages before they're rolled into a final release. To make sure you don't have any loose ends, these distributions and many other individual Open Source projects also publish an endless stream of security advisories and updates. Add to this security mechanisms like SELinux, AppArmor, and the upcoming TOMOYO Linux, and SMACK, and you know they mean business. So what room does this leave for specialist security distros?Read Why Do We Need Specialist Security Distros? in full
At the time of this writing, Ubuntu's 9.10 "Karmic Koala" will be due out in just ten days. Users around the world are hard at work testing and submitting fixes, eagerly trying to patch every hole in time for the final relesae. While there maybe a few quirks here and there, they have so far done an amazing job of integrating new technologies and upgrading underlying technologies. This article by Christer Edwards outlines some of the exciting new technologies and features that will be showcased in Ubuntu 9.10 "Karmic Koala".Read What's New In Ubuntu 9.10 "Karmic Koala" in full
This article by Mary Cooch, author of Moodle 2.0 First Look, gives a brief look at what Moodle 2.0 has to offer with the exciting new modules and enhanced features, and the major overhauls in the file uploading and navigation system.Read What's New in Moodle 2.0 in full