TinyURL API

Anyone who tweets or sends URL’s in emails likes short URL’s for different reasons. Twitter users like ’em because of the 140 char limit for tweets. You don’t want to use all 140 chars allocation on some hairy ugly URL–you also need a few to hint what it IS! Programmatic email senders like ’em because . . . → Read More: TinyURL API

A hack for my Hubpages fans

This is a prototype expression of thanks in the form of Linky LUV in appreciation of my fans over on Hub Pages It randomly displays one of their widgets right here in an IFRAME. This has been upgraded so it will do anybody’s fans, not just mine. If you don’t like the looks of the . . . → Read More: A hack for my Hubpages fans

Security Articles Growing a Tail!

The dork is featured again in Issue #4 (August 1) of Information Security Short Takes that I was in last month. This blog features a monthly blog carnival potpourri webzine of useful selection of security related articles. I know, I know, nobody wants to hear about security. It’s boring as all get out, and . . . → Read More: Security Articles Growing a Tail!

Woot! The comment spammers found me

Akismet is an awesome spam filter plugin no wordpress blogger should be without. It’s point ‘n’ click installable if you happen to use wordpress, but they claim that hacks exist for 20 other blogging platforms and they do provide an API. Hacks don’t mean evil programs, they just mean ways to enable you to use . . . → Read More: Woot! The comment spammers found me

Avoid the phish

A old school phish typically involves an Instant Messenger or email message asking you to click a link. This tried and true technique uses bogus links, and this article shows you how to detect them. Newer phishes bite you at a different level. They feed you “good” links but then they cause the good links . . . → Read More: Avoid the phish

Take Action against Credit Card Fraud

Another database: CRACKED A recent security breach of a local online merchant prompted me to write this post. As a shopping cart software author and former security analyst at Symantec I know the nuts and bolts of security from several perspectives. Credit card fraud is a huge and growing problem. See my article about credit . . . → Read More: Take Action against Credit Card Fraud

Dominating Ning — First Try

Dorkage’s first attempt at hacking inside of Ning. . . . → Read More: Dominating Ning — First Try

If you get this, you’re a geek

Strange name for student causes data loss. . . . → Read More: If you get this, you’re a geek

Master Plan to Leverage Ning Events

Where I lay out my master plan to leverage Ning . . . → Read More: Master Plan to Leverage Ning Events

TalkR — Audio of your blog

What is it with me and Text-To-Speech? Just fond memories, I guess. At one time I had a TalkR widget in my Blogger blog. It had a list of all the posts and it would speak whichever one you picked. It must have worked at one time or I would have never published it. I . . . → Read More: TalkR — Audio of your blog

A sample text widget

Etiam pulvinar consectetur dolor sed malesuada. Ut convallis euismod dolor nec pretium. Nunc ut tristique massa.

Nam sodales mi vitae dolor ullamcorper et vulputate enim accumsan. Morbi orci magna, tincidunt vitae molestie nec, molestie at mi. Nulla nulla lorem, suscipit in posuere in, interdum non magna.