WordPress Theme Installation

WordPress is a free and open source blogging tool and a content management system (CMS) based on PHP and MySQL. WordPress is the most popular blogging system in use on the Web, at more than 60 million websites.

WordPress Themes :

WordPress users may install and switch between themes. Themes allow users to change the look and functionality of a WordPress website or installation without altering the information content or structure of the site.

Themes may be installed using the WordPress “Appearance” administration tool or theme folders may be uploaded via FTP. The PHP, HTML(hyper text markup language) and cascading style sheets(CSS) code found in themes can be added to or edited for providing advanced features. Thousands of WordPress themes exist, some free, and some paid for templates.

WordPress users may also create and develop their own custom themes if they have the knowledge and skill to do so. Continue reading…

Shell shock vulnerability

A new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems, in addition to Mac OS X. Known as the “Bash Bug” or “ShellShock,” the GNU Bash Remote Code Execution Vulnerability could allow an attacker to gain control over a targeted computer if exploited successfully. And because Bash is everywhere on Linux and Unix-like machines and interacts with all parts of the operating system, everyone anticipates that it will have lot of repercussions.

How does Shellshock work?

Shellshock exploits a flaw in how Bash parses environment variables; Bash allows functions to be stored in environment variables, but the issue is Bash will execute any code placed after the function in the environment variable value.

For example, an environment variable setting of VAR=() { ignored; }; /bin/id will execute /bin/id when the environment is imported into the bash process.
I am vulnerable?

You can check if you’re vulnerable by running the following lines in your default shell.

env X=”() { :;} ; echo vulnerable” `which bash` -c “echo Check completed”

If you see the word “vulnerable” echo’d back , then you’re at risk. Continue reading…

Email signature in different mail clients and webmail

Email signatures are generally used to display the sender’s name and contact information at the end of an email. We can use website links or even images in the signature for providing identity of an email owner. It is much easier if this content is automatically added to the end of every email instead of manually adding it for each email. We can create email signature in both webmail and email clients.

Below are the instructions on how to add your own custom email signature in different email clients and webmail. Continue reading…