Monthly Archives: September 2012

WordPress to Dump Blogroll Feature in 3.5

Starting in WordPress 3.5, the Links feature will no longer be a part of the WordPress core. The blogroll feature will be available as a plugin, Link Manager, so it’s not completely going away. Though it could be more convenient to use the Menus feature in place of the older blogroll function, having a menu to hold your blogroll links.

Lorelle VanFossen goes into considerable detail on the issue, with a few migration routes, including using custom menus.

Personally, I have mixed feelings about blogrolls. On on one hand, they’re a convenient way to recommend some of your favorite blogs in a persistent manner. Certainly good for a personal blog. On the other hand, they’re of more limited benefit for more topical sites. It’s probably a good thing that it’s being removed from the WordPress core, since blogrolls aren’t as popular as they were ten years ago.

Pandora Password Debacle

There’s a post going around on Google Plus that shows off a glaring security hole in the popular internet radio site Pandora. If you use FireBug (or the HTML inspection tool in your browser of choice), you can see that the Password field on…

BlogBuzz September 22, 2012

Archive Data for One Cent per Month with Amazon Glacier

Amazon recently launched their latest Web Services Product, which aims to help you store data for the long term. Amazon Glacier costs one cent per gigabyte per month to store data, with some limitations on the retrieval. It costs $0.12/GB to retrieve data if…

Ditching GoDaddy? Here Are Some Alternatives

Whether it’s because of the recent major outage, their brazen support for SOPA, or their longstanding questionable business practices, there are many reasons one may wish to avoid doing business with GoDaddy. (Archive.org has a mirror of the old NoDaddy site if you’re curious…

6 Articles You Should Read Before Storing Users’ Passwords

It’s 2012 and there are still an awful lot of high-profile websites leaking users’ passwords. Someone manages to snatch the database table, and then they crack the passwords, which are more often than not encrypted with weak MD5 or SHA1 hashes. It’s not enough…and…

BlogBuzz September 1, 2012