blog.strictly-software.com
Strictly Software: The Wordpress Survival Guide
http://blog.strictly-software.com/2010/06/wordpress-survival-guide.html
A technical blog about web and database development discussing the various issues and problems I have experienced and overcome in my 15 years of coding. Friday, 18 June 2010. The Wordpress Survival Guide. Surviving Wordpress - An Introduction. As well as my technical blog here on blogger I have a number of Wordpress sites. Which I host myself on a virtual server. I have now been using Wordpress and PHP. Is the most important thing you can do and luckily due to the nature of WordPresses plugins. Which is ...
blog.strictly-software.com
Strictly Software: February 2009
http://blog.strictly-software.com/2009_02_01_archive.html
A technical blog about web and database development discussing the various issues and problems I have experienced and overcome in my 15 years of coding. Thursday, 19 February 2009. Using SQL 2005 System Views. FROM INFORMATION SCHEMA.TABLES. ORDER BY TABLE NAME. SELECT TOP 1 *. SELECT TOP 1 *. SELECT TOP 1 *. WHERE type = 'U'. Each statement should return the same table name with varying amounts of related data. Using System Views to create SQL. Filtering databases using sys.databases. JOIN sysusers as u.
blog.strictly-software.com
Strictly Software: January 2009
http://blog.strictly-software.com/2009_01_01_archive.html
A technical blog about web and database development discussing the various issues and problems I have experienced and overcome in my 15 years of coding. Tuesday, 20 January 2009. ISAPI URL Rewriting - Hot Linking. Banning Image Hot Linking. I was updating my ISAPI. Rules the other day implementing some new rules to identify XSS hacks and new SQL injection fingerprints. I implemented the rules with a redirect to a logging page that logged the referral property. Webmail or email client. Then there would al...
blog.strictly-software.com
Strictly Software: December 2008
http://blog.strictly-software.com/2008_12_01_archive.html
A technical blog about web and database development discussing the various issues and problems I have experienced and overcome in my 15 years of coding. Monday, 1 December 2008. Job Rapists and other badly behaved bots. How bad does a bot have to be before banning it? I had to ban a particular naughty crawler the other day that belonged to one of the many job aggregators. That spring up ever so regularly. This particular bot belonged to a site called jobrapido. Require that the job poster or jobboard.
blog.strictly-software.com
Strictly Software: June 2009
http://blog.strictly-software.com/2009_06_01_archive.html
A technical blog about web and database development discussing the various issues and problems I have experienced and overcome in my 15 years of coding. Tuesday, 30 June 2009. Googlebot, Sitemaps and heavy crawling. Googlebot over-crawling a site. I recently had an issue with one of my jobboards that meant that Googlebot was over-crawling the site. Which was causing the following problems:. Heavy loads on the server. The site in question was recording 5 million page loads. And affecting other sites.
blog.strictly-software.com
Strictly Software: Web Developing - My 10 Golden Rules For Developers
http://blog.strictly-software.com/2011/07/web-developing-my-10-golden-rules.html
A technical blog about web and database development discussing the various issues and problems I have experienced and overcome in my 15 years of coding. Sunday, 23 August 2015. Web Developing - My 10 Golden Rules For Developers. Ten Golden Rules for any Web Developer. When you have developed code for a living for the best part of 18 years you soon come up with a list of rules that help keep you sane and prepare you for the next disastrous project coming your way. 1 Always add comments. 2 Format your code.
blog.strictly-software.com
Strictly Software: Accessing your computers external IP address from your computer without using a browser
http://blog.strictly-software.com/2013/01/accessing-your-computers-external-ip.html
A technical blog about web and database development discussing the various issues and problems I have experienced and overcome in my 15 years of coding. Monday, 28 January 2013. Accessing your computers external IP address from your computer without using a browser. Access your computers external IP address from your desktop without using a browser. Following on from yesterdays blog post about what can happen if you get given a new IP address. Without having to open an Internet browser. First or writing ...
blog.strictly-software.com
Strictly Software: March 2009
http://blog.strictly-software.com/2009_03_01_archive.html
A technical blog about web and database development discussing the various issues and problems I have experienced and overcome in my 15 years of coding. Saturday, 21 March 2009. Problems Upgrading to IE 8. Upgrading to Internet Explorer 8.0. There are plenty of sites already out there listing all the many bugs or "features" that IE 8 has brought to the table but so far the two main ones I have come across are:. Problems when FirebugLite is also running in IE 8. I was getting a " Function Expected. Thisca...
blog.strictly-software.com
Strictly Software
http://blog.strictly-software.com/2012/04/please-take-1-minute-to-pick-what-you.html
A technical blog about web and database development discussing the various issues and problems I have experienced and overcome in my 15 years of coding. Thursday, 19 April 2012. But here is a cut down version of it. Over 15 years of SQL development work. From relational to real-time VLDB's I have designed, developed and maintained systems from MySQL to MS SQL 2008 (and soon SQL 2012). I have a solid grounding in both object orientated and procedural development methodologies. Will show you the wide varie...
blog.strictly-software.com
Strictly Software: November 2008
http://blog.strictly-software.com/2008_11_01_archive.html
A technical blog about web and database development discussing the various issues and problems I have experienced and overcome in my 15 years of coding. Monday, 24 November 2008. Trying to detect spoofed user-agents. Or get round client side code that may be blocking certain browsers from using certain functionality which is all a good reason for using object detection rather than browser sniffing when deciding which code branch to run. This form of spoof detection will only work if its only the user age...
SOCIAL ENGAGEMENT