Monthly Archives: August 2013

Software Tool For Developing Desktop Applications

This review offers a list of examples of various tools you can use for developing software. Towards the end of the article I also mention some free tools you can use. Take a few minutes and read the entire review. You will be glad you did – believe me!

Linux development tools for developing desktop application

If you are looking for Linux development tools then you should check our Apache, MySQL and PHP. These can be installed on both Windows and Linux. These are good especially if you want to run the applications in windows after they are fully developed.

What I like about Apache is that its maintenance is quite easy and comes well documented. If you are looking for a full Linux/Apache combination you can just download and run Ubuntu. You can also use Kubuntu, which is Debian based. It generally offers ease of use and is updated regularly. Another alternative is Ubuntu (Gnome).

Some examples of software development tools

In addition to the ones I have already presented above, some of the software tools for developing desktop applications include, Apple Xcode, XVT , Clarion, CodeGear, Ebase Platform, Gambas, Gupta, WinDev, Habanero, REALbasic, Microsoft Visual Basic, Panther, Lazarus, RADvolution Designer, Runtime Revolution, The Virtual Enterprise, wxDev-C++, Microsoft Visual Foxpro and MX-Frame.

Free Software tool for developing desktop applications

Now if you are looking for free applications development software then you can try java. You can also get some compilers of C++ and C at no cost. In fact there are numerous sites that offer free trial and absolutely free software downloads that you can visit.

[ad_2]

Source link

Why & How to Use Either a HTML Redirect Or Htaccess Redirect For Your URL Redirection Requirements

There are many instances where a page redirect is required for either onsite or offsite linking.

Onsite Redirection

It is very common as websites develop to either want to change a web pages url its extension between HTML and php. Unfortunately when you do this all the existing links both on & off site are destroyed leaving potential visitors & the search engines with “page not found”.

There are 2 very simple redirection techniques that you can utilize to overcome this problem.

1/ Leave the existing web page but add HTML redirect code to the header. This keeps all existing offsite links valid

Timed Redirect Code (add between the (head)(/head) tags.

(meta HTTP-EQUIV=”REFRESH” content=”0; URL=http://www.yourwebsite.com/newpage.html”)

(Remove gaps in web address)

If you wish to display the page before redirection occurs then change the 0 value to the number of seconds to display the page.

2/ 301 Redirect in a htaccess file.

301 is a permanent redirection code inserted into a file called .htaccess. If you already have a .htaccess file in your websites directory just insert this code…

(Redirect 301/oldwebpage.html http://www.yoursite.com/newpage.html)

If you don’t have a .htaccess file simply paste the code into notepad, save as .htaccess & upload to your sites directory.

Offsite Redirection

Whether to disguise long or ugly affiliate links or track visitors actions, HTML redirects are a fundamental element of online marketing.

Affiliate Links

Although the vast majority of online shoppers still have no idea about affiliate programs & the links associated with them, many are nervous about clicking on long ugly URL’s. This particular problem can be easily overcome by using anchor text in place of a url. This is the code for creating anchor text –

(a href=”http://www.youraffiliatelink.com”)Your Anchor Text(/a) This will display as just – Your Anchor Text – & link to the affiliate URL.

Anchor text is not a redirect but it will dramatically improve any links, click through rate. With this technique the destination URL is still displayed in the lower left corner of your visitors browser, when they mouse over the link. Although this is generally not a problem some visitors are aware of this & will check before clicking, potentially losing sales & commissions.

Utilizing a combination of the onsite timed redirect code & anchor text will disguise the destination page from 99% of web site visitors. Simply paste the redirect code into a notepad & save as RedirectPageName.html then use this page in your anchor text.

These methods are free but can be time consuming if you are creating allot of links. Your redirects are also visible if someone were to look at your pages source code.

When this type of html redirect is used in affiliate marketing the visitor tracking capabilities are very limited making page optimization very difficult & more of a trial & error process.

Using Redirection Software with mysql simplifies the whole process of creating & tracking links. It also enables clickthroughs to be tracked back to the original keyword search simplifying onsite optimization & PPC keyword campaigns.

[ad_2]

Source link

How to Detect and Prevent a WordPress Spam Injection Attack

Last month my WordPress blog was the victim of a spam injection attack. I am the art director for a highly rated graphic design and website design company. I have years of experience in website design, WordPress Blog Design and I am security minded in my approach to web development – I was still a victim of clever hacking. It can happen to anyone and it is happening at an increasingly alarming rate. The worst part about this experience was that not only my WordPress blog was attacked – my entire corporate website was removed from Google SERPS. We were ranked in the Google Top 10 for several coveted spots such as; graphic design company, packaging design companies, brand identity company, and many more. Our site was completely out of Google search results for two weeks in which time we lost countless leads. This experience absolutely sickened me! It also created way too many hours of work dedicated to repairing the hackers damage and recovering our website’s Google Rankings. During my research into fixing the spam injection hackers damage I discovered that this is a widespread problem with WordPress blogs. It’s happening to thousands of people and it is not limited to people using older versions of WordPress.

Recovering from a WordPress Spam Injection attack is not fun, but you can regain your Google Search Results after being hacked by a spam injection attack. If you’ve been compromised, hopefully you have your website and WordPress blog backed up. It can be a pretty tedious process to go through every file and folder on your server locating and deleting spam files. I recommend backing up your WordPress posts and completely removing all files and databases from your server. Then do a complete fresh upload of your website and a complete reinstall of WordPress.

If you have already been removed from Google Search Results then you will want to notify Google immediately of what has happened. The best policy with Google is to be specific in your explanations. You will need to make sure that you have removed all bad files from your server and then contact Google again explaining what actions you have taken to resolve the situation and submit your “request for reconsideration”. In most cases where a valid site has been hacked Google will restore their sites rankings within two weeks. However, don’t expect any notifications from Google on their progress of reevaluating your website or WordPress blog. I am writing this article in hopes that it will help anyone from having to go through that processs.

What should you look for if you suspect a WordPress Spam Injection Attack?

The first thing you should look for is a list of spammy keywords showing up in your list of keywords located in your Google Webmasters Tools. If you aren’t using Google Webmaster Tools then you should definitely look into this. When your site starts showing up in weird looking search results, which can also be seen in Google Webmaster Tools under search results for your site, you need to act fast because at this point Google will act fast to remove your site from SERPS in order to protect others who may be at risk from visiting your website.

The key to detection is awareness. Be vigilant in monitoring your website and your website’s stats. Spam injections are a clever, effective form of hacking and show no outward signs of infection. However, If you do a Google Site Search for spammy key words like; {site:yoursite.com viagra} you will be able to see if your site is referencing spam keywords. You will not be able to see spam showing up on your site. In order to physically see spam tags in your site you must go to the “cached” version of your web pages and view them in “text mode”. If you’ve been infected you will now be able to see spam keywords, usually appearing as a footer.

What does a Spam Injection Do?

Spam Injection software hides spam keyword links in code that is usually encoded with a PHP function that effectively scrambles html to be decoded once safely embedded on your server, database, etc. You won’t see these files decoded, but the Google Bot and other bots will when crawling your site! Once the Bots access the code the spam injection software has done it’s work, effectively stealing your search index to improve their own pagerank.

These spam injection hacks are very hard to detect software injections inserted into your site, usually on a database level, via templates or plugins. This is part of the reason WordPress is such a target for these attacks. Plugins are what make WordPress so dynamic and cool, but they are an open doorway for spam injection software. For obvious reasons we should all focus our attention on prevention so that you don’t have to deal with detection.

What can I do to prevent a WordPress Spam Injection Attack?

I’ll start with the simplest things you can do to protect your WordPress blog or site from spam attacks first. . .

First: Update WordPress

Updating WordPress is the easiest thing to do, so why not do it? I usually wait a short period of time after a new release to make sure the bug fixes have been worked out. Please be aware that simply updating WordPress is NOT enough!

Second: Pick a good password

Pick a good password. Don’t use the same password on every site. If you’re really diligent you can also change your password regularly.

Third: Change the admin user name

The default WordPress user name is “admin”. This is just a guess, but I suspect that the majority of people never change this. Don’t give any information away. Hackers are clever, but like burglars they would rather move on to the easy score. You can change your admin by creating a new user and then deleting the admin user. You’ll be given the option to migrate posts to another user.

Fourth: Hide your WordPress Version Number

David Kierznowski of blogsecurity.net lately released a simple plugin to hide your wordpress installation version number.

The no version plugin is a simple plugin that will replace the version number with blanks, so anyone doing a view “page source” from the browser on your site will not be able to see your wordpress version.

Fifth: Protect your plugins

Plugins are the easy gateway way for hackers to access your blog. All WordPress files begin with (wp-) by default so, hackers can quickly discover which plugins you’re using by going to /wp-content/plugins/, if you haven’t renamed your database files. A quick remedy to block a blank index.html file in the wp-content/plugins/ folder.

More Complex Procedures:

First: Protecting your WP-Config file.

This file contains your database name, database username and database password. Obviously, you don’t want anyone to have access to something this valuable. If you don’t feel comfortable making changes to your config you may want to contact your hosting company for help otherwise you can add the following code to your .htaccess file:

PHP:

1. # protect wpconfig.php

2. {files wp-config.php}

3. order allow,deny

4. deny from all

5. {/files}

Second: Change your database names

Note: do not attempt this unless you are comfortable with PHPMyAdmin and making changes to MySQL. If you are not comfortable with this you should hire a professional to assist you.

Begin by backing up your database!

Many people have problems with the database table name prefix changing functionality of WP Security Scan. You can manually change your database names following the instructions below.

1. BACKUP your WordPress database to a sql file – you can do this in “phpmyadmin”.

2. You should Deactivate your plugins as a precaution before proceeding. You can reactivate them after you have finished.

3. Make a copy of the .sql file you created, then you can open the .sql file and use a text editor to find and replace all “wp_” prefix to “rename_”.

4. Now, drop all tables of your WordPress databases, but DO NOT drop the database.

5. import the (.sql) file that you have just edited into your wordpress databases.

6. Finish by editing your wp-config.php file and change the $table_prefix = ‘wp_’; to $table_prefix = ‘something_’;

I hope that this article will help someone avoid the fallout associated with a spam injection hack. I love the functionality of WordPress, but unfortunately, this experience has left me so cautious that my company no longer uses a WordPress Blog along with our corporate website. Maybe someday.

[ad_2]

Source link