Jul 31, 2008

Install Microsoft Fonts in Linux

How to Install Microsoft Fonts in Linux Guide:

Tested on Distribution: Ubuntu Hardy Heron

How to install MS core fonts

You can install the MS core fonts by installing the msttcorefonts package. To do this, enable the “Universe” component of the repositories. This is done by default in Hardy. After you do that, use the following command from the command line:

$sudo apt-get install msttcorefonts


After installing new fonts, you will have to log out and log in again to be able to see and use the new fonts. If you want to avoid this, you can regenerate the fonts cache by issuing the following command:

$sudo fc-cache -fv


And that is it. Microsoft Windows Font Styles are now part of your Linux Ubuntu System.

Source: netstat -an|grep -i listen

Guide how to Export Wordpress Blogroll Links

Because there is no Plugin for wordpress that export blogroll links I will write this simple guide instead of copy paste all 100+ entries of blogroll links

Login to your admin:
http://www.domain.com/wp-admin/
Go to Manage -> Links
on Manage Links click “Add New” -> Import Links
you will see this or similar table
Specify an OPML URL: ” http://www.copyoldwebsiteblogroll.com/wp-links-opml.php ” -> click Import OPML File

Jul 21, 2008

WordPress Theme

It’s been a long time since themes.wordpress.net stopped accepting new themes. Since then most theme authors have been distributing their themes from their own sites, without a good centralized place for people to browse, search, comment on, and rate themes. With the success of the plugins directory, we’ve wanted to have those same benefits in a theme directory. Today is the day we start making that happen, with the introduction of wordpress.org/extend/themes/.

Bringing the new theme directory under the WordPress “extend” umbrella allowed us to take advantage of all the infrastructure that has already been built up to support WordPress.org. If you’ve browsed through the plugin directory, you’ll feel right at home in the new theme directory.

We’ve gone through great lengths to make this as painless as possible for theme authors. You don’t need to know anything about Subversion (our back end magic takes care of all that for you), just login with your WordPress.org username and password and go to the upload page. From there you upload your regular theme zip file and we take care of the rest.

Once you upload your new theme we do a few automated checks for some of the requirements for each theme. If we find one that you missed we’ll provide you an error and description of what needs to be fixed. When a theme upload has been accepted we’ll send you an email and put it in the queue to be reviewed, to make sure we didn’t miss anything. After the theme has been approved you’ll get another email letting you know that the theme is now live.

That catches you up to where we’re at today. When you finish that theme you’ve been slaving over, upload it to the new directory and let us know what you think. Since so much has changed since the old theme directory we’re starting fresh from zero. If you’ve got specific questions or suggestions contact us and we’ll do our best to get them answered.


Source: http://wordpress.org/development/

Jul 2, 2008

The History Of Computer Virus

The Internet has been abuzz lately claiming we are in the 25th year of the computer virus. After digging through some Web sites offering insight into the history of the computer virus, only one thing is constant: Elk Cloner was not the first. But if we fast-forward to the 1970s, the world's first computer virus actually sprang up. As if you needed more evidence to prove this isn't the 25th anniversary of the computer virus, 1975 ushered in one of the most legendary viruses ever: Pervading Animal.

Rising Company showed that a total of 133,717 new viruses affected the Chinese mainland in the first half of 2007. If it spreads, technology experts warn the latest strains of the insidious RINBOT computer virus could hijack network systems of businesses worldwide. The recommended method of detecting and cleaning the computer from any computer viruses or other malware is an anti-virus protection program. In order for a computer virus to affect you, it requires some explicit action on your part. don't click on attachments and your inbox will be safe from computer viruses. One should note that in 1989 there began total epidemics of computer viruses in Russia, caused by the same "Cascade", "Jerusalem" and "Vienna", which besieged the computers of Russian users.
Viruses are malicious software programs that have been designed by other computer users to cause destruction and havoc on a computer and spread themselves to other computers where they can repeat the process. Once the virus is made, it is often distributed through shareware, pirated software, e-mail, P2P programs, or other programs where users share data. The virus is interesting because of its ability to attach itself to other programs and cause them to become viruses as well. Most likely the process of changing priorities will resemble the process of DOS dying and new operating systems gaining strength together with their specific programs.
Besides that the infected system "hanged" if some of the programs tried to reach outside the V86 mode, for example to determine the presence of extended memory. Periodically on the mainframes at that period of time there appeared programs called "the rabbit". These programs cloned themselves, occupied system resources, thus lowering the productivity of the system. As a result there appears a huge number of miscellaneous "Trojan horses", programs, doing some kind of harm to the system when started.

The anti-virus programs developers had nothing to do but rush to adjust the polymorphous viruses detecting technique, designed so far just for DOS-viruses, to the new conditions. There from virus has made the way to USA where through the staff oversight infected at once several popular Web servers that started to distribute infected game programs. There may appear other problems who which might bring a lot of trouble to users and enough extra work to the developers of anti-virus programs. Anti-virus programs aren't very good at detecting Trojan horse programs, so be extremely careful about opening text-only files and Word/Excel documents from unknown or 'dubious' sources.

Source: http://www.bybyespyware.net