Author: brianhaddock

WordPress .htaccess Tips and Tricks 0

WordPress .htaccess Tips and Tricks

.htaccess files (or “distributed configuration files”) provide a way to make configuration changes on your Wordpress site on a per-directory basis. A .htaccess file, containing one or more configuration directives, is placed in a particular document directory on your Wordpress site, and the directives apply to that directory, and all subdirectories thereof. Using directives in .htaccess, you can block spam, secure your website, and control other website actions.


Hardening WordPress Security

Wordpress out of the box is fairly secure but there are still some pretty big holes. In addition, hosting environments and installation requirements often introduce gaping security holes in the Wordpress framework. Below are a few best practices to help secure your Wordpress framework.


Port WordPress from DreamHost to 1and1 VPS

I recently moved several WordPress blogs from DreamHost to a new 1and1 Virtual Private Server installation. Here are directions and screenshots of the move along with notes on problems that I ran across (and the resolution I found). I moved from a DreamHost shared host plan that killed scripts when memory consumption exceeded 100MB to a 1and1 VPS solution that provides 4,000MB of burst RAM.


Crazy Scrabble Words

Been playing a lot of Wordfeud on my Droid and realized that there really is an art to Scrabble. Here are some game notes that I’ve picked up.

Passwordless logins in Unix 0

Passwordless logins in Unix

Connecting via SSH, requires a user provide his identity to the remote machine using one of several methods. One method lets you access the remote system without entering a password at each login. Normally, when you log in to a system, you authenticate by entering your password for that system. Your password goes, as it is typed, to the remote system, which authenticates it against the /etc/passwd or /etc/shadow file. By contrast, SSH allow a “password-less” authentication method based on public-key cryptography.

Security and Hacking Notes 0

Security and Hacking Notes

Encryption and Authentication DESCRIPTION Privacy protection using DES (symmetric algorithm) involves the use of two secret keys. Each party must share their secret key with others. This makes this sort of encryption difficult to...

Oracle DBA Notes 0

Oracle DBA Notes

Useful Oracle DBMS Tips and Tricks CHECKING WORKSPACE ALLOCATION On DW’s NT box, click on the svmgr button on the toolbar. Log in as SYSTEM. Click Storage and the Tablespace tab. The percentages are...

Useful Unix Commands 0

Useful Unix Commands

Useful Unix commands To search text in files and all subdirectories find [directory] -name [files] | xargs grep [text to search for] Example to find “insert” in the odb directory (search all files in...