Best to skip wordpress 3.1 release for now.

From WordPress administration, it is better to skip release candidate 3.1 for now, many bugs were implemented and the changes have been rolled back, it you installed it already, you might want to return to a previous backup of your site.

–Danville Computer Doc

WordPress 3.1 Release Candidate 3 is now available. After careful evaluation of the 3.1 features in RC2, we recognized the need to make some adjustments. There are some significant differences from previous versions of 3.1, so please review the changes if you have been developing against a beta or RC version.

The biggest change is the removal of AJAX list tables, which had been an effort to move all of our list-style screens to full AJAX for pagination, searches, and column sorts, and to consolidate the list-style screens into a single API that plugins could leverage. Unfortunately, with more testing came realizations that there were too many major bugs and usability issues with how the functionality was implemented, so we’ve spent the last week rolling back the most important portions of the feature.

  • For users: AJAX has been entirely disabled for the list tables. We hope to bring this back again, in a form that is properly and fully implemented, in a future release. Column sorting remains, but everything else has returned to its 3.0 state.
  • For developers: The entire list table API is now marked private. If you attempt to leverage new components of the API, you are pretty much guaranteeing that your plugins will break in a future release, so please don’t do that. :-) We hope to enable all the fun new goodies for public use in a future release.

This is the only way we could prevent any regressions in functionality and usability from WordPress 3.0 to 3.1. That’s right, users and plugin authors can still do everything you used to be able to do (and a little bit more).

Because of the code churn between RC2 and RC3, this release candidate needs a lot of testing. Every list screen needs testing. In particular, the comment moderation screen needs testing, especially with keyboard shortcuts (if you didn’t know about those, now’s your chance to try them out).

Other fixes in RC3 include:

  • Properly display the author dropdown in Quick Edit
  • Various important fixes to numerous taxonomy query variables
  • Fixes to the theme deletion process
  • Fixes to pages used for posts
  • IIS and Multisite: Avoid resetting web.config on permalink save
  • Properly validate post formats and their rewrite rules

Anti-virus Removal

Ever open an email and the next thing you know, you are staring at a screen full of error messages, pop-up windows or “system” messages that look real, indicating some computer problem or another.? Are you left scratching your head wondering what happened and worse, how to fix it without loosing all of your data you haven’t got around to backing up yet?
Well, you have probably been infected by a computer virus, or a piece of malware. In general the infections are classified as a “virus”. They may be of a whole host of more technical classifications, but you get the point. These little programs can cause great headaches if you don’t know how to deal with them or you simply ignore the problem thinking it is a real computer error but things seem to be working for the moment. This is a mistake, as the longer you let these things go, the deeper they can bury themselves into your system, making it almost impossible to remove without a full system reset.

Anti-virus removal is not a simple process and very rarely is it an automated one. Everything from hidden folders to registry tweaks can be required to fully remove mal-ware from your system. If you are not sure of the process, it is best to let someone with experience handle the disinfection as you can very easily erase important files and folders, leaving your system useless and unable to boot.

If you decide to try it yourself, I recommend Avira for anti-virus, Spybot for malware removal and hijackthis v.1.99 to stop hidden services from running. If you want a professional removal, I am glad to help. I have never failed to successfully remove a piece of malware or a virus from a computer in 20+ years.

Give the Danville Computer Doc a call for an after hours pc-antibiotic injection and get your pc feeling better quick.

— Danville Computer Doc

Internet I.D.

If you value privacy at all, please pay very very close attention to this story. If this is passed, within a few months, your access to a free and open internet will cease to exist.

I am not sure where this story originated, but it is too important not to post the full text. The url that I got it from is: http://www.cbsnews.com/8301-501465_162-20027837-501465.html
 — Danville Computer Doc

STANFORD, Calif.–President Obama is planning to hand the U.S. Commerce Department authority over a forthcoming cybersecurity effort to create an Internet ID for Americans, a White House official said here today.

It’s “the absolute perfect spot in the U.S. government” to centralize efforts toward creating an “identity ecosystem” for the Internet, White House Cybersecurity Coordinator Howard Schmidt said.

That news, first reported by CNET, effectively pushes the department to the forefront of the issue, beating out other potential candidates, including the National Security Agency and the Department of Homeland Security. The move also is likely to please privacy and civil-liberties groups that have raised concerns in the past over the dual roles of police and intelligence agencies.

The announcement came at an event today at the Stanford Institute for Economic Policy Research, where U.S. Commerce Secretary Gary Locke and Schmidt spoke.

The Obama administration is currently drafting what it’s calling the National Strategy for Trusted Identities in Cyberspace, which Locke said will be released by the president in the next few months. (An early version was publicly released last summer.)

“We are not talking about a national ID card,” Locke said at the Stanford event. “We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy, and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities.”

The Commerce Department will be setting up a national program office to work on this project, Locke said.

Details about the “trusted identity” project are remarkably scarce. Last year’s announcement referenced a possible forthcoming smart card or digital certificate that would prove that online users are who they say they are. These digital IDs would be offered to consumers by online vendors for financial transactions.

Schmidt stressed today that anonymity and pseudonymity will remain possible on the Internet. “I don’t have to get a credential, if I don’t want to,” he said. There’s no chance that “a centralized database will emerge,” and “we need the private sector to lead the implementation of this,” he said.

Jim Dempsey of the Center for Democracy and Technology, who spoke later at the event, said any Internet ID must be created by the private sector–and also voluntary and competitive.

“The government cannot create that identity infrastructure,” Dempsey said. “If it tried to, it wouldn’t be trusted.”

Inter-agency rivalries to claim authority over cybersecurity have existed ever since many responsibilities were centralized in the Department of Homeland Security as part of its creation nine years ago. Three years ago, proposals were circulating in Washington to transfer authority to the secretive NSA, which is part of the U.S. Defense Department.

In March 2009, Rod Beckström, director of Homeland Security’s National Cybersecurity Center, resigned through a letter that gave a rare public glimpse into the competition for budgetary dollars and cybersecurity authority. Beckstrom said at the time that the NSA “effectively controls DHS cyberefforts through detailees, technology insertions,” and has proposed moving some functions to the agency’s Fort Meade, Md., headquarters.

One of the NSA’s missions is, of course, information assurance. But its normally lustrous star in the political firmament has dimmed a bit due to Wikileaks-related revelations.

Bradley Manning, the U.S. Army private who is accused of liberating hundreds of thousands of confidential government documents from military networks and sending them to Wikileaks, apparently joked about the NSA’s incompetence in an online chat last spring.

“I even asked the NSA guy if he could find any suspicious activity coming out of local networks,” Manning reportedly said in a chat transcript provided by ex-hacker Adrian Lamo. “He shrugged and said, ‘It’s not a priority.'”

.

Internet Explorer 9 Beta

Run, don’t walk and download the beta version of internet explorer 9! I have been a hater of ie for many years, but I have to admit this version rocks! HTML5 support, CSS3 compliant, hardware rendering of 2d html pages, super clean interface, super fast page renderings… Go get it and see for yourself, you won’t be disappointed.
Oh yeah, and tabbed browsing!!!!!!
http://ie.microsoft.com/testdrive/

— Danville Computer Doc

Posts navigation

1 2 3
Scroll to top