power-phplistThanks to Jesse Heap for making a plug in for PHPLIST.  I found some code from GNU , and was able to modify the plug in to accept the Captcha in the form.  This is a mod to Jesse’s PHPList Form Integration.

Background:

PhpLIST is a open source ListServ program that runs on PHP Web platform.  I found CaptchaCode mod  by Alan Fairhall.   However, I needed the Captcha for the Plug in Widget used on WordPress by Jesse Heap.   So, using the CaptchaCode PHP, we are able to accomplish adding Captcha to the Widget.  Here’s how.

Read the rest of this entry »

by William Mantz, ITIL Certified Practitioner

Attribution By Perditax (Own work) [CC0], via Wikimedia Commons - Public DomainIn the IT Change Management process, you are dealing with all types of change requests from any direction. In the data center alone, just think of all the countless number of Applications that are supported when you look at racks of infrastructure. This rack of equipment, as you know, serves up the IT application and Service, and has cross-platform and cross-product connections. Then, we layer on the disparate contacts for each IT application we need to reach out with a communication.

Read the rest of this entry »

by William Mantz,  ITIL Certified Practitioner
InterconnectionAs ITSM practitioners, we are often asked why ITIL Service Management starts with the foundation of the Configuration Management Database (CMDB) or what is called Configuration Management System (CMS).

The value that this configuration data provides can be shown this way.   First, it starts with the architecture map. Read the rest of this entry »

WordPress Cache Hacks

Posted: October 22, 2013 in General, Wordpress

This is an older article, but still relevant as I am hearing some sites are still being compromised by hack exploits.   WordPress is pretty stable, but as you can see adding 3rd party plug-ins can make it vulnerable to attacks.  It also good to keep the sites and plug-ins  up-to-date, and always check third party plug-ins before using them.    So, if you run a Word Press site with these third party plug-ins listed below, you will want to check out this post below and double check your site.

Update WP Super Cache and W3TC Immediately – Remote Code Execution Vulnerability Disclosed

By  on April 23, 2013

http://blog.sucuri.net/2013/04/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html

To be honest, the sites I had used some cache plug-ins, I deleted and removed the plugins.  I didn’t trust it after seeing the results of sites being hi-jacked, and reading this article by Tony.  Thanks to Tony Perez for posting on his blog at the above link.  But as always, review and make your own judgement.

Welcome!

Posted: June 26, 2009 in General

William’s Grab Bag is a collection of Articles, Posts, and interesting information.

Read the rest of this entry »