Archive for 2015

Shortcode Problems: WordPress 4.4

miqrogroove
2015-08-31T11:07:48+00:00

I will briefly summarize Shortcode API changes since WordPress 4.0 and then kick off some ideas for a roadmap.

The first major accomplishment was the expansion of the API documentation, including a new large section I wrote about the formal syntax for shortcode input.

I also put forward a robust parser concept for the function wptexturize() that promised to re-introduce the ability to use unrestricted HTML code inside of shortcodes and shortcode attributes.  That concept went through many, many changes before being introduced in v4.2.3.  After consulting with the WordPress security team, and after extensive testing of the shortcode parsing functions, we determined that the shortcodes-first parsing strategy was fundamentally flawed and could not be included with any version beyond v4.2.2.  This is why I added an HTML parser to the Shortcode API and ultimately curtailed the use of shortcodes inside HTML rather than expand the use of HTML inside shortcodes.

Read the rest of this entry »

22 Aug 2015

Category:
Systems Engineering

Tags:

Discuss:
3 Comments

Cookies Not Working in IE10

miqrogroove
2015-08-08T15:06:12+00:00

I’ve finally fixed a crippling bug in Internet Explorer 10 that was preventing me from using any website that required cookie support.

This problem seemed to plague my Windows 2012 server from day one.  I’m not yet sure what was special about this configuration.  No matter how many settings I changed, every website I visited told me that I had cookies completely disabled.

I used these steps right before the browser started working correctly:

Step 1 – Find the “Delete Browsing History” dialog box.

ie-safety-menu

Read the rest of this entry »

8 Aug 2015

Category:
Systems Engineering

Tags:

Discuss:
Comments Go Here

How to Block the Amazon AWS EC2

miqrogroove
2015-01-02T14:53:36+00:00

Years ago, I found it necessary to start maintaining a list of Amazon’s subnets so that I could block them easily.  This list can be used in .htaccess and firewalls that can block access using CIDR subnet addresses.

Recent entries are bold.

Read the rest of this entry »

2 Jan 2015

Category:
Security

Discuss:
Comments Go Here