Category Archives: WordPress

Update to WordPress 4.0 – “Benny”

WordPress 4.0 was released on 4th September 2014.

Update to WordPress 4.0 using the same process as shown for WordPress 3.6

Update to WordPress 3.6

Remember

Before applying any update remember to take a backup and confirm that the backup file will unpack.

See also

Update to WordPress 3.9 – “Smith”

WordPress 3.9 was released on 16th April 2014.

Update to WordPress 3.9 using the same process as shown for WordPress 3.6

Update to WordPress 3.6

Remember

Before applying any update remember to take a backup and confirm that the backup file will unpack.

See also

Sign up for my InTouchCRM Newsletter

If you use the InTouchCRM system then you may have configured a Sign-up Form so that people can subscribe to your Newsletter. The system offers two methods for including it in your site

  1. Automatic Form – using Javascript
  2. Manual Form – using HTML

Either way, integrating the code into a standard WordPress site isn’t particularly easy. Pasting raw Javascript is fraught with danger; for users who switch between Visual and Text edit modes the Javascript code sometimes just disappears. Poof!

Pasting HTML has its own problems AND there can be a lot of it AND if may also include Javascript.

Fortunately, using the oik plugin, you can easily create the Automatic form using the [bw_jq] shortcode.

Using [bw_jq] to reference Javascript

Sample JavaScript <script type="text/javascript" src="https://www.intouchcrm.co.uk/app/settings/signupforms/v/Default.aspx?s=8398EA42-E683-4730-8A49-A1F09E48C46E"></script>

converts to

[bw_jq src=”https://www.intouchcrm.co.uk/app/settings/signupforms/v/Default.aspx?s=8398EA42-E683-4730-8A49-A1F09E48C46E” inline=n]

Why did I put this here?

Bobbing Wide doesn’t actually publish a Newsletter using InTouchCRM, but we wanted to test the Sign-up form. So here it is. Have fun.

WordPress security: don’t use admin / password

It’s happening all the time. Automated systems are trying to get access to your website. Some exploit known vulnerabilities; others just use brute force. The latest scare is a large botnet that attempts to find your WordPress administrator’s password and therefore get control of your site. It tries to login as “admin” using a huge set of passwords. If your administrator username is “admin” then you’re pretty vulnerable. AND if your password is one of the most common then you’re stuffed. So change both now! Continue reading

Use shortcodes to reduce the amount you type

Use the [bw_posts] shortcode to list blog posts Similar to [bw_list]