Blog

Viewing posts from March, 2015

Blocking the internet underbelly from your server

People selling unmentionables on the internet resort to spam. One example is the use of comments on Blog articles by robots to advertise pornography and disreputable medications. I have created several blogs, and if I enable comments without administrator approval, within several hours to a day the blog will be covered with thousands of comments advertising things you just don't want on your site.

One click resize window for Word

Documents loading up in Word generally open in preview layout, which I often find unreadable, but I can not find anyway to default to print mode, and a large number of clicks are involved in changing the view.

Facebook Integration

This article builds on the excellent tutorial at art and logic without the bootstrap css, but adding lots of screen shots. To have a function application that allows authentication through Facebook, the following tasks occur in order:

Using the Pipe Operator - String replace in multiple files

The unix command line is a wonderful thing. It allows us to string many commands together by use of a pipe. For example, if I want to find all python files, I could type

Recent Tweets