Posts by Nick Batik
For the notes to this meetup, visit Best Practices for Administering WordPress
It’s hard to pan the whole room with my phone, but this is my demonstration of real-time blogging as part of a content strategy.
There were too many pictures to fit on the WordCamp site, so here they all are, with special thanks to photographer Harrison Funk for all his great work! If you have any pictures of your own to add to the gallery, please upload them through our form.
Eric Highland, @erichighland Austinot.com These slides are on slideshare. Visit Eric’s Facebook, and Twitter How Search Engines Work SEO encompasses any unpaid methods used to get a website to rank well on search engine results pages (SERPS) Content is no longer king, it is one piece in an overall SEO puzzle. How to find if […]
Rich Schwerdtfeger CTO Accessibility IBM Software Chair, W3C WAI-ARIA Working Group ARIA A way for authors to apply rich accessibility semantics in Web content A way to reproduce the keyboard fuctionality of desktop apps Accessibility API defines a standard contract between an application component and an assistive technology Role State Actions Caret Selection Text Hypertext […]
This entry is part 4 of 4 in the series WordPress SecurityInstall a plugin or use cronjob to create database and file backups on a regular basis. This may not be directly related to security, but in case you detect intrusion, you will be glad you make a backup. I personally like BackWPup.
This entry is part 3 of 4 in the series WordPress SecurityHide WordPress Version in the Header Tag Although you have deleted the WordPress version meta data from your theme, you may still get WordPress version line in the page returned by the blog software. The culprit is, since version 2.5 WordPress has added the […]
This entry is part 2 of 4 in the series WordPress SecurityChange The Default “Admin” Username The problem Brute force is one of the easiest ways to break a password. The method is simple: try as many different passwords as possible until the right one is found. Users of the brute force method use dictionaries, which […]