Lately, after upgrading all of my blogs to the latest WordPress version, I’ve noticed a strange behavior when editing my posts. It appears that whenever I pressed “Save,” the post content would not update on the administration console. On the other hand, it would update on the main site.
For example, if I edited a post, everything from the title to the actual body of the article would not change. I would still see the original content when logged into the administration console. But if I viewed my site, everything would appear normally. The changes would only have reflected on the actual public portion of the blog! Even weirder was that when I checked my MySQL database, nowhere was any record of the original version! So where was WordPress pulling this outdated post data from?
Read the rest of this entry »
If you’re an avid Digg reader like me, you’re fully aware of the “who blogged this?” feature prominently displayed “above the fold” of each story. Among my three blogs, I’ve been meaning to publish posts inspired by the many stories that I read each week. As a matter of fact, I have a near-ten-page list of articles that I plan to write, most of them inspired by Digg stories. But, I haven’t had the time to actually put those ideas into words. Until now …
Today, I released an article about Bug Me Not in my Information Bank Blog. I remember finding out about this godsend website from Digg. Naturally, I wanted a link back from Digg on the “who blogged this?” section since it was a relevant post. So, I entered all the necessary blog data information in my profile page. Then, I clicked the “blog this” link on the corresponding digg story and pressed “Submit.”
Read the rest of this entry »
As a hacker, it is necessary to know the basics of port opening and forwarding. Why is that? Computer enthusiasts usually setup firewalls so that they can be online with less worries of an outside intrusion from the untamed Internet. They also usually have programs that require access to a port. Some programs include BitTorrent (Shame on you!), P2P Gnutella programs like Phex (Shame on you!), NetMeeting, some instant messaging programs, and servers (like HTTP, Remote Desktop, FTP). Since firewalls block all ports, it is necessary to manually open the ones that are needed.
Read the rest of this entry »