<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ePanorama.net &#187; WordPress</title>
	<atom:link href="http://www.epanorama.net/blog/category/wordpress/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 15 Apr 2026 20:31:27 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>One-third of the web! — WordPress</title>
		<link>https://www.epanorama.net/blog/2019/03/25/one-third-of-the-web-wordpress/</link>
		<comments>https://www.epanorama.net/blog/2019/03/25/one-third-of-the-web-wordpress/#comments</comments>
		<pubDate>Mon, 25 Mar 2019 03:52:57 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Wordpress]]></category>
		<category><![CDATA[WWW dev]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182059</guid>
		<description><![CDATA[<p>https://wordpress.org/news/2019/03/one-third-of-the-web/ WordPress now powers over 1/3rd of the top 10 million sites on the web according to W3Techs. Our market share has been growing steadily over the last few year. Over the years WordPress has become the CMS of choice for more and more people and companies. What’s New in WordPress 5.1 (Moving PHP Forward) <a class="moretag" href="https://www.epanorama.net/blog/2019/03/25/one-third-of-the-web-wordpress/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="https://wordpress.org/news/2019/03/one-third-of-the-web/">https://wordpress.org/news/2019/03/one-third-of-the-web/</a><br />
<span style="color:rgb(68,68,68); font-family:" opensanssans-serif="opensanssans-serif" _16px="font-size:_16px" normal="white-space:normal" _400="font-weight:_400" _2text-indent0px="orphans:_2text-indent0px" none="float:none" _2="widows:_2" _0px="_-webkit-text-stroke-width:_0px" rgb255255255="background-color:rgb255255255" initial="text-decoration-color:initial" inlineimportant="display:inlineimportant" left="text-align:left">WordPress now powers over 1/3rd of the top 10 million sites on the web according to<span> </span></span><a href="https://w3techs.com/technologies/history_overview/content_management/all" style="text-decoration: none; color: rgb(76, 166, 207); font-weight: 400; border-bottom: 1px solid rgb(223, 223, 223); font-family: " open sans="sans" sans-serif="sans-serif" _="background-color:_" _16px="_16px" normal="normal" _2="_2" start="start" _0px="_0px" none="none" rgb255="rgb255" _255="_255">W3Techs</a><span style="color:rgb(68,68,68); font-family:" opensanssans-serif="opensanssans-serif" _16px="font-size:_16px" normal="white-space:normal" _400="font-weight:_400" _2text-indent0px="orphans:_2text-indent0px" none="float:none" _2="widows:_2" _0px="_-webkit-text-stroke-width:_0px" rgb255255255="background-color:rgb255255255" initial="text-decoration-color:initial" inlineimportant="display:inlineimportant" left="text-align:left">. Our market share has been growing steadily over the last few year</span>.<br />
<span style="color:rgb(68,68,68); font-family:" opensanssans-serif="opensanssans-serif" _16px="font-size:_16px" normal="white-space:normal" _400="font-weight:_400" _2text-indent0px="orphans:_2text-indent0px" none="float:none" _2="widows:_2" _0px="_-webkit-text-stroke-width:_0px" rgb255255255="background-color:rgb255255255" initial="text-decoration-color:initial" inlineimportant="display:inlineimportant" left="text-align:left">Over the years WordPress has become the CMS of choice for more and more people and companies.<span> </span></span></p>
<h1 class="heading--huge" style="margin:0px; padding:0px; border:0px; font-style:normal; font-variant-ligatures:normal; font-variant-caps:normal; font-variant-numeric:inherit; font-variant-east-asian:inherit; font-weight:900; font-stretch:inherit; font-size:32px; line-height:1.2; font-family:" brandontext="brandontext" baseline="vertical-align:baseline" break-word="word-break:break-word" rgb676578="color:rgb676578" normal="white-space:normal" _2text-indent0px="orphans:_2text-indent0px" none="text-transform:none" _2="widows:_2" _0px="_-webkit-text-stroke-width:_0px" initial="text-decoration-color:initial" left="text-align:left">What’s New in WordPress 5.1 (Moving PHP Forward)</h1>
<p><a href="https://kinsta.com/blog/wordpress-5-1/?utm_source=facebook&amp;utm_medium=cpc">https://kinsta.com/blog/wordpress-5-1/?utm_source=facebook&amp;utm_medium=cpc</a></p>
<p style="margin:0px0px28.8px; padding:0px; border:0px; font-style:normal; font-variant-ligatures:normal; font-variant-caps:normal; font-variant-numeric:inherit; font-variant-east-asian:inherit; font-weight:300; font-stretch:inherit; font-size:18px; line-height:inherit; font-family:Roboto; vertical-align:baseline; color:rgb(67,65,78); letter-spacing:normal; orphans:2text-indent:0px; text-transform:none; white-space:normal; widows:2; word-spacing:0px; -webkit-text-stroke-width:0px; text-decoration-style:initial; text-decoration-color:initial; text-align:left;">WordPress 5.1 “Betty” was officially released on February 21, 2019, and is available for download.</p>
<p style="margin:0px0px28.8px; padding:0px; border:0px; font-style:normal; font-variant-ligatures:normal; font-variant-caps:normal; font-variant-numeric:inherit; font-variant-east-asian:inherit; font-weight:300; font-stretch:inherit; font-size:18px; line-height:inherit; font-family:Roboto; vertical-align:baseline; color:rgb(67,65,78); letter-spacing:normal; orphans:2text-indent:0px; text-transform:none; white-space:normal; widows:2; word-spacing:0px; -webkit-text-stroke-width:0px; text-decoration-style:initial; text-decoration-color:initial; text-align:left;">WordPress 5.1 is the first major release since the launch of the WordPress block editor (AKA Gutenberg) in<span> </span><a href="https://kinsta.com/blog/wordpress-5-0/" target="_blank" rel="noopener" style="margin: 0px; padding: 0px; border: 0px; font: inherit; vertical-align: baseline; cursor: pointer; position: relative; text-decoration: none; background-repeat: no-repeat; transition: all 200ms ease 0s; background-size: 100% 100%; background-position: right center; color: rgb(83, 51, 237); background-image: linear-gradient(transparent calc(100% - 1px), rgb(83, 51, 237) 1px);">WordPress 5.0</a>.<span> </span></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2019/03/25/one-third-of-the-web-wordpress/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Ultimate Guide to WordPress and GDPR Compliance (in Plain English)</title>
		<link>https://www.epanorama.net/blog/2018/05/30/the-ultimate-guide-to-wordpress-and-gdpr-compliance-in-plain-english/</link>
		<comments>https://www.epanorama.net/blog/2018/05/30/the-ultimate-guide-to-wordpress-and-gdpr-compliance-in-plain-english/#comments</comments>
		<pubDate>Wed, 30 May 2018 19:52:52 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Wordpress]]></category>
		<category><![CDATA[WWW dev]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=177913</guid>
		<description><![CDATA[<p>http://www.wpbeginner.com/beginners-guide/the-ultimate-guide-to-wordpress-and-gdpr-compliance-everything-you-need-to-know/ Are you confused by GDPR, and how it will impact your WordPress site? This article tries to explain everything you need to know about GDPR and WordPress (without the complex legal stuff). The EU isn’t some evil government that is out to get you. Their goal is to protect consumers. <a class="moretag" href="https://www.epanorama.net/blog/2018/05/30/the-ultimate-guide-to-wordpress-and-gdpr-compliance-in-plain-english/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.wpbeginner.com/beginners-guide/the-ultimate-guide-to-wordpress-and-gdpr-compliance-everything-you-need-to-know/">http://www.wpbeginner.com/beginners-guide/the-ultimate-guide-to-wordpress-and-gdpr-compliance-everything-you-need-to-know/</a><br />
<span style="color: rgb(70,70,70); font-family: proxima-nova,Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255,255,255); text-decoration-style: initial; text-decoration-color: initial; display: inline!important; float: none; text-align: left;">Are you confused by GDPR, and how it will impact your WordPress site?<span> </span></span><br />
<span style="color: rgb(70,70,70); font-family: proxima-nova,Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255,255,255); text-decoration-style: initial; text-decoration-color: initial; display: inline!important; float: none; text-align: left;">This article tries to explain everything you need to know about GDPR and WordPress (without the complex legal stuff).</span><br />
<span style="color: rgb(70,70,70); font-family: proxima-nova,Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255,255,255); text-decoration-style: initial; text-decoration-color: initial; display: inline!important; float: none; text-align: left;">The EU isn’t some evil government that is out to get you. Their goal is to protect consumers</span>.</p>
<p><img class="alignnone wp-image-177912 size-full" src="http://www.epanorama.net/newepa/wp-content/uploads/2018/05/wpid-screenshot_20180530-223756480645218.png" width="1080" height="1920"></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2018/05/30/the-ultimate-guide-to-wordpress-and-gdpr-compliance-in-plain-english/feed/</wfw:commentRss>
		<slash:comments>43</slash:comments>
		</item>
		<item>
		<title>Vulnerability httpoxy for PHP, Go, Python and others</title>
		<link>https://www.epanorama.net/blog/2016/08/05/vulnerability-httpoxy-for-php-go-python-and-others/</link>
		<comments>https://www.epanorama.net/blog/2016/08/05/vulnerability-httpoxy-for-php-go-python-and-others/#comments</comments>
		<pubDate>Fri, 05 Aug 2016 05:54:12 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[PHP]]></category>
		<category><![CDATA[Wordpress]]></category>
		<category><![CDATA[WWW dev]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=44871</guid>
		<description><![CDATA[<p>A CGI application vulnerability called httpoxy was announced in July with coordinated disclosure from many vendors. httpoxy is a set of vulnerabilities that affect application code running in CGI, or CGI-like environments.  The vulnerability allows an attacker to remotely set the HTTP_PROXY environment variable on affected servers which can lead to a number of bad <a class="moretag" href="https://www.epanorama.net/blog/2016/08/05/vulnerability-httpoxy-for-php-go-python-and-others/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><!--StartFragment-->A <a href="https://blog.qualys.com/laws-of-vulnerabilities/2016/07/18/cgi-application-vulnerability-httpoxy-for-php-go-python-and-others">CGI application vulnerability</a> called <a href="https://httpoxy.org/">httpoxy</a> was <a href="https://httpoxy.org/">announced</a> in July with coordinated disclosure from many vendors. <!--StartFragment--><a href="https://httpoxy.org/"><em>httpoxy</em></a> is a set of vulnerabilities that affect application code running in CGI, or CGI-like environments.  The <a href="https://blog.qualys.com/laws-of-vulnerabilities/2016/07/18/cgi-application-vulnerability-httpoxy-for-php-go-python-and-others">vulnerability allows an attacker to remotely set the HTTP_PROXY environment variable on affected servers which can lead to a number of bad consequences</a>. <!--StartFragment-->This can lead to a <a href="https://httpoxy.org/">remotely exploitable vulnerability</a>.<!--StartFragment-->This vulnerability mainly<a href="https://blog.cloudflare.com/cloudflare-sites-protected-from-httpoxy/"> affects applications that use “classic” CGI execution models</a>. For PHP (both CGI and mod_php versions) w<!--StartFragment-->hether you are vulnerable <a href="https://httpoxy.org/">depends on your specific application code and PHP libraries</a>. If your run Python or Go under CGI, they can also be vulnerable. <!--StartFragment--><a href="https://httpoxy.org/">httpoxy has a number of CVEs</a> assigned to it.<!--EndFragment--><!--EndFragment--><!--EndFragment--></p>
<p>This issue is not new, but has just became to limelight again. <!--StartFragment--><a href="https://www.howtoforge.com/tutorial/httpoxy-protect-your-server/">HTTPOXY affects clients that honor the HTTP_PROXY variable and use it for their proxy configuration and server side applications which use HTTP_PROXY as real or emulated variable in their environment</a>. This bug was first discovered over 15 years ago &#8211; but still in July 2016 researchers found that the <!--StartFragment--><a href="https://httpoxy.org/">vulnerability was still exploitable in PHP</a><!--EndFragment-->. <!--StartFragment-->So, the <a href="https://httpoxy.org/">bug was lying dormant for years, like a latent infection</a>: pox. To put it plainly: <a href="https://httpoxy.org/">there is no way to trust the value of an <code class="highlighter-rouge">HTTP_</code> env var in a CGI environment</a><!--EndFragment--> and <a href="https://httpoxy.org/">you should block the Proxy header</a>.</p>
<p><!--StartFragment-->Best advice is to patch as soon as possible. Immediate mitigation before patching can be performed by blocking ‘Proxy’ request headers as early as possible -<!--StartFragment--> <a href="https://httpoxy.org/">httproxy.org</a> has released details for many enviroments (Apache, OpenBSD, Nginx/FastCGI and others).<!--StartFragment--> <a href="https://httpoxy.org/">If you’re running PHP or CGI, you should <strong><em>block the <code class="highlighter-rouge">Proxy</code> header</em></strong> now</a>. Blocking can be done in <a href="https://www.apache.org/security/asf-httpoxy-response.txt">web server</a>, web load balancer, web proxy or <a href="https://blog.cloudflare.com/cloudflare-sites-protected-from-httpoxy/">cloud proxy service</a>.</p>
<p><!--StartFragment-->The <a href="https://www.howtoforge.com/tutorial/httpoxy-protect-your-server/">vulnerability is easily remotely exploitable and servers can be scanned for it</a>, for details on that read <!--StartFragment--><a href="https://www.howtoforge.com/tutorial/httpoxy-protect-your-server/">HTTPOXY Vulnerability: How to protect and test your web server</a><!--EndFragment--><!--EndFragment--><!--EndFragment--><!--EndFragment--><!--EndFragment--> article that recommends <!--StartFragment--><a href="https://httpoxy.rehmann.co/">https://httpoxy.rehmann.co/</a><!--EndFragment--> service for testing your own servers.</p>
<p><a href="https://httpoxy.org/"><img class="alignnone" src="https://httpoxy.org/img/logo.svg" alt="" width="400" height="200" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2016/08/05/vulnerability-httpoxy-for-php-go-python-and-others/feed/</wfw:commentRss>
		<slash:comments>12</slash:comments>
		</item>
		<item>
		<title>Usage Statistics and Market Share of WordPress for Websites, November 2015</title>
		<link>https://www.epanorama.net/blog/2015/11/08/usage-statistics-and-market-share-of-wordpress-for-websites-november-2015/</link>
		<comments>https://www.epanorama.net/blog/2015/11/08/usage-statistics-and-market-share-of-wordpress-for-websites-november-2015/#comments</comments>
		<pubDate>Sun, 08 Nov 2015 13:50:10 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Wordpress]]></category>
		<category><![CDATA[WWW dev]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=35516</guid>
		<description><![CDATA[<p>http://w3techs.com/technologies/details/cm-wordpress/all/all Posted from WordPress for Android <a class="moretag" href="https://www.epanorama.net/blog/2015/11/08/usage-statistics-and-market-share-of-wordpress-for-websites-november-2015/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="http://w3techs.com/technologies/details/cm-wordpress/all/all">http://w3techs.com/technologies/details/cm-wordpress/all/all</a></p>
<p><span class="post_sig">Posted from WordPress for Android</span></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2015/11/08/usage-statistics-and-market-share-of-wordpress-for-websites-november-2015/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>How To Blog: Five Honest Tips &amp; A Survey</title>
		<link>https://www.epanorama.net/blog/2015/09/08/how-to-blog-five-honest-tips-a-survey/</link>
		<comments>https://www.epanorama.net/blog/2015/09/08/how-to-blog-five-honest-tips-a-survey/#comments</comments>
		<pubDate>Tue, 08 Sep 2015 18:06:26 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Journalism and media]]></category>
		<category><![CDATA[Wordpress]]></category>
		<category><![CDATA[WWW dev]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=34002</guid>
		<description><![CDATA[<p>http://arcticstartup.com/2015/01/07/how-to-blog-five-honest-tips-a-survey Posted from WordPress for Android <a class="moretag" href="https://www.epanorama.net/blog/2015/09/08/how-to-blog-five-honest-tips-a-survey/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="http://arcticstartup.com/2015/01/07/how-to-blog-five-honest-tips-a-survey">http://arcticstartup.com/2015/01/07/how-to-blog-five-honest-tips-a-survey</a></p>
<p><span class="post_sig">Posted from WordPress for Android</span></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2015/09/08/how-to-blog-five-honest-tips-a-survey/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>RSS, email and social media connection</title>
		<link>https://www.epanorama.net/blog/2015/06/02/rss-email-and-social-media-connection/</link>
		<comments>https://www.epanorama.net/blog/2015/06/02/rss-email-and-social-media-connection/#comments</comments>
		<pubDate>Tue, 02 Jun 2015 07:05:45 +0000</pubDate>
		<dc:creator><![CDATA[epanorama]]></dc:creator>
				<category><![CDATA[ePanorama.net]]></category>
		<category><![CDATA[Wordpress]]></category>
		<category><![CDATA[WWW dev]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18900</guid>
		<description><![CDATA[<p>RSS was meant to be a different way to present content. RSS technology evolution in online publishing promised to make it really easy to not only publish regular updates to web-based content, but also keep track of a large number of your favorite websites or blogs, without having to remember to check each site manually <a class="moretag" href="https://www.epanorama.net/blog/2015/06/02/rss-email-and-social-media-connection/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="http://en.wikipedia.org/wiki/RSS"> RSS</a><a href="http://andrewchen.co/the-death-of-rss-in-a-single-graph/"> was meant to be a different way to present content.</a> <a href="https://support.google.com/feedburner/answer/79408">RSS technology evolutio</a>n in online publishing promised to make it <a href="https://support.google.com/feedburner/answer/79408">really easy to not only publish regular updates to web-based content, but also keep track of a large number of your favorite websites or blogs, without having to remember to check each site manually or clutter your email inbox</a>.</p>
<p><a href="http://en.wikipedia.org/wiki/RSS"><img class="alignnone" src="http://upload.wikimedia.org/wikipedia/en/thumb/4/43/Feed-icon.svg/128px-Feed-icon.svg.png" alt="" width="128" height="128" /></a></p>
<p>It seems that <a href="http://en.wikipedia.org/wiki/RSS">RSS</a> did not fully live up to the promise for end user perspective. It is useful technology that I use in this blog (<a href="http://www.epanorama.net/newepa/feed/">http://www.epanorama.net/newepa/feed/</a>). RSS feeds have been very popular, but are are somewhat fading in popularity, even to point that some articles <a href="http://andrewchen.co/the-death-of-rss-in-a-single-graph/">expect death of RSS</a>. Nowadays the trend is that people follow <span id="__w2_eRqCeD1_toggle_link">Twitter and Facebook instead of RSS. <a href="http://andrewchen.co/the-death-of-rss-in-a-single-graph/">One of the best aspects of email subscriptions (and Twitter) is that you can actually see who’s taken interest in your work. </a></span></p>
<p><a href="http://www.quora.com/If-RSS-is-dead-whats-next">Is RSS dead or not?</a> <span id="__w2_eRqCeD1_toggle_link">To me, <a href="http://www.quora.com/If-RSS-is-dead-whats-next">anytime someone says a tech is dead it usually means that tech is not very interesting to discuss anymore</a>, or isn&#8217;t seeing the most innovative companies doing new things with it. </span>Ultimately <a href="http://andrewchen.co/the-death-of-rss-in-a-single-graph/">RSS will stick around as a way for content services to talk to each other</a> (it does that well). <span id="__w2_eRqCeD1_toggle_link"><a href="http://www.quora.com/If-RSS-is-dead-whats-next">The protocol is still very much alive</a>, while people can get the data from other means than RSS from various services, very often RSS is the method that gets the data to the service people use. On thing to remember is to make sure that your RSS feed content is valid, </span>I tested my feed to pass the validation service at <a href="https://validator.w3.org/feed/">https://validator.w3.org/feed/</a>.</p>
<p>I still offer RSS feed at <a href="http://www.epanorama.net/newepa/feed/">http://www.epanorama.net/newepa/feed/</a>. I also <a href="http://www.epanorama.net/newepa/some/">post updates to Twitter and Facebook</a>.</p>
<p>If you prefer to get update on material posted to this blog to clutter your email box (I post here quite often), there are <a href="http://blog.themeforest.net/resources/7-rss-to-emailsms-services-you-can-use-for-your-item-feed/">many</a> <a href="http://rssforward.com/">RSS</a> <a href="http://chris.pirillo.com/how-to-get-rss-feeds-via-email/">to mail</a> <a href="http://mailchimp.com/features/rss-to-email/">services</a>.  From various alternatives I found out that <a href="https://blogtrottr.com/">Blogtrottr</a> worked the way I liked. You can get information on new postings to your e-mail box using <a href="https://blogtrottr.com/">Blogtrottr</a> by giving URL <a href="http://www.epanorama.net/newepa/feed/">http://www.epanorama.net/newepa/feed/</a> and your e-mail address to this service, and selecting feed type (Realtime works well).</p>
<p><a href="https://blogtrottr.com/"><img class="alignnone" src="https://blogtrottr.com/images/blogtrottr-trans.png" alt="" width="384" height="47" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2015/06/02/rss-email-and-social-media-connection/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>4 methods to backup remote files across a network &#124; regx.dgswa.com</title>
		<link>https://www.epanorama.net/blog/2015/05/28/4-methods-to-backup-remote-files-across-a-network-regx-dgswa-com/</link>
		<comments>https://www.epanorama.net/blog/2015/05/28/4-methods-to-backup-remote-files-across-a-network-regx-dgswa-com/#comments</comments>
		<pubDate>Thu, 28 May 2015 16:32:13 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Wordpress]]></category>
		<category><![CDATA[WWW dev]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=32209</guid>
		<description><![CDATA[<p>http://regx.dgswa.com/html/content/4-methods-backup-remote-files-across-a-network Posted from WordPress for Android <a class="moretag" href="https://www.epanorama.net/blog/2015/05/28/4-methods-to-backup-remote-files-across-a-network-regx-dgswa-com/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="http://regx.dgswa.com/html/content/4-methods-backup-remote-files-across-a-network">http://regx.dgswa.com/html/content/4-methods-backup-remote-files-across-a-network</a></p>
<p><span class="post_sig">Posted from WordPress for Android</span></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2015/05/28/4-methods-to-backup-remote-files-across-a-network-regx-dgswa-com/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security tips for WordPress blogging</title>
		<link>https://www.epanorama.net/blog/2015/05/11/security-tips-for-wordpress-blogging/</link>
		<comments>https://www.epanorama.net/blog/2015/05/11/security-tips-for-wordpress-blogging/#comments</comments>
		<pubDate>Mon, 11 May 2015 17:27:18 +0000</pubDate>
		<dc:creator><![CDATA[epanorama]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Wordpress]]></category>
		<category><![CDATA[WWW dev]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=23537</guid>
		<description><![CDATA[<p>WordPress is the most popular blogging system in use on the Web: WordPress was used by more than 23.3% of the top 10 million websites as of January 2015. This blog runs on WordPress. WordPress users may install and switch between themes and it plugin architecture allows users to extend its features. It support mobile well: <a class="moretag" href="https://www.epanorama.net/blog/2015/05/11/security-tips-for-wordpress-blogging/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><span class="st"><a href="https://wordpress.org/"><em>WordPress</em></a> is the <a href="http://en.wikipedia.org/wiki/WordPress"><em>most popular blogging</em> system</a> in use on the Web</span>: <a href="http://w3techs.com/technologies/overview/content_management/all/">WordPress was used by more than 23.3% of the top 10 million websites as of January 2015</a>. This blog runs on WordPress. WordPress users may install and switch between <a title="Theme (computing)" href="http://en.wikipedia.org/wiki/Theme_%28computing%29">themes</a> and it <a class="mw-redirect" title="Plugin (computing)" href="http://en.wikipedia.org/wiki/Plugin_%28computing%29">plugin</a> architecture allows users to extend its features. It support mobile well: by selecting suitable mobile friendly responsive theme for your site you can make your site look nice for mobile users and for site management there are mobile apps for all major smart phone platforms.</p>
<p><a href="https://wordpress.org/"><img class="alignnone" src="https://s.w.org/screenshots/3.8/responsive.png" alt="" width="932" height="664" /></a></p>
<p>WordPress is very nice blogging platform for users, but because of many options available and huge popularity there are also security issues on the systems. Many security issues have been uncovered in the WordPress software over the years, and new ones come out every now and then.</p>
<p>So how to handle Wodpress security issues to keep your blog safe? Here some of my tips targeted especially for those who run WordPress software on their site (if you use WordPress hosted by for example <a href="https://www.wordpress.com/">wordpress.com</a> issues are somewhat different):</p>
<p><a href="https://nakedsecurity.sophos.com/2015/01/01/malware-infection-suspected-at-isc/">Typical hacking and malware problems with WordPress installs</a>, if you’d like to review your own WordPress setup, include: Poor password hygiene, including weak passwords, shared or re-used passwords, and no two-factor authentication. Poisoned third-party content such as adverts served from external servers. Use plugins only from trusted sources.</p>
<p class="content-header__title nolinks">Make sure that you ahave all the security related settings in wp-config.php set in sensible way. For some tips on this check <a href="https://blogvault.net/wordpress-security-1-securing-wp-config-php/">WordPress Security: Part 1 Securing wp-config.php</a> and <a href="http://code.tutsplus.com/tutorials/conquering-the-wp-configphp-file-11-good-practices--wp-26338">Conquering the wp-config.php File &#8211; 11 Good Practices</a>.</p>
<p class="pagetitle">When you access your site management at Linux shell level, use always secure communications methods. I recommend to access Linux server shell with SSH and files with SCP. It is also a good idea if you use SSH certificates for authentication istead of normal username+password. Do not use telnet or FTP because they are insecure. If possible perform your WordPress administration through web interface throug HTTPS instead of HTTP.</p>
<p class="pagetitle">Make sure that you keep the WordPress up to date. You need to be prepared to update your WordPress and plugins when new security issues get published. Update quickly when serious security issues are reported. <a href="https://nakedsecurity.sophos.com/2015/01/01/malware-infection-suspected-at-isc/">Unpatched WordPress software or plugins, leaving known security holes open for attackers.</a> If possible, use automatic updating service.</p>
<p>Design a backup procdure to back up your site contents. You will need that in case somone hacks your site or there are serious problems on your hosting side. So make regular backups. <a href="http://codex.wordpress.org/WordPress_Backups">Your WordPress database contains every post, every comment and every link you have on your blog. If your database gets erased or corrupted, you stand to lose everything you have written. There are many reasons why this could happen and not all are things you can control</a>. With a proper backup of your WordPress database and files, you can quickly restore things back to normal.<a href="http://codex.wordpress.org/WordPress_Backups"> Site backups are essential because problems inevitably occur and you need to be in a position to take action when disaster strikes.</a> You need backups! Spend some time to <a href="http://codex.wordpress.org/WordPress_Backups"> make an easy, convenient backup of your database will allow you to spend even more time being creative and productive with your website</a>. <a href="http://www.cloudways.com/blog/ddos-attacks-wordpress-security/">Do not end up losing a few months of hard work due too no backups</a>. Make sure that the backups you have made really work (that you can restore data from them in case you really need them, non-working backups are just waste of time).</p>
<p>There are several methods of automating the backup process available.<a href="http://codex.wordpress.org/WordPress_Backups"> Various plugins exist to take automatic scheduled backups of your WordPress database</a>. I have found that <a href="https://vaultpress.com/">Vaultpress</a> a good WordPress automatic backup service: it supports realtime syncing of all WordPress content to the VaultPress servers for a reasonable montly fee. I use <a href="https://vaultpress.com/">Vaultpress</a> for real-time backup and I also make my own backup files (database dump and WordPress directory contents) to another server periodically.</p>
<p class="pagetitle">When you run WordPress on your own Linux system or some shared hosting Linux server, it is very important to to <a href="http://stackoverflow.com/questions/18352682/correct-file-permissions-for-wordpress">set the file and directory permissions right</a>. Generally less permissions you give, the better for security, but if you do not give enough permissions your WordPress does not work. <a href="https://wordpress.org/support/topic/what-permission-do-you-suggest-for-wp-config">What permission do you suggest for wp-config?</a> article recommends for your own server: Directories 755, files 644, (sometimes, the upload directory will require an exception). Permissions any lower that still permit functionality on your particular server setup is fine (lower number is more secure). If you use shared hosting service, you should make sure that other users can&#8217;t read your sensitive files, especially wp-config.php (use 750 permissions). Overly-liberal access controls giving too much power to too many users.</p>
<p class="pagetitle">Keep your wp-config-.php file secure bcause wp-config.php that contains your database password and main admin credentials. If you are in shared hosting site (or any server that has many users), <a href="https://wordpress.org/support/topic/what-permission-do-you-suggest-for-wp-config"><em><strong>the permissions of your wp-config.php should be 750</strong></em></a> (lower): <strong><em>It means that no other user will be able to read your database username and password.  </em></strong>Changing permissions to 750 effectively removes both the &#8220;read&#8221; and the &#8220;execute&#8221; options for &#8220;others&#8221; or world. You can be even more restrictive. <a href="https://wordpress.org/support/topic/what-permission-do-you-suggest-for-wp-config">If the website works with wp-config.php set to 600 (most restrictive &#8211; will only work if the file is &#8220;owned&#8221; by the same Unix user that runs apache), try that. If not, set it to 640</a> (still fairly restrictive; only the owner is allowed to modify the file, but any users &#8211; specifically the apache user &#8211; that might be in the group that owns the file can still read it).</p>
<p>Make also sure that web users can&#8217;t get the contents of that file accidentally. In normal use if somebody tries to read that from wordpress directory with web browser, the data in goes through PHP system and the user can&#8217;t see the source code that has the details in it. But if you accidentally give users possibility to read that file in raw form without going through PHP interpreter, your secrets leak out. This can happen if you accindetally in a way or another disable PHP interpreted on your directory (some configuration error). Other common way to leak wp-config.php contents is that have some backup of your wp-config-php with some other name on web readable directory, common mistakes here are to leave copy of old version or backup with name wp-config.bak or using editor that leves temperary copy after editing like wp-config.php~ If you plan publish your site contents on some open source repositorio (like github), you need to be careful that you don&#8217;t publish your wp-config.php contents to the world, because that would allow someone else to hack to your site and <a href="http://wptavern.com/ryan-hellyers-aws-nightmare-leaked-access-keys-result-in-a-6000-bill-overnight">even cost you a lot in hosting bill</a>. You can also consider if <a href="http://wordpress.stackexchange.com/questions/58391/is-moving-wp-config-outside-the-web-root-really-beneficial">moving wp-config outside the web root really beneficial</a>.</p>
<p>Consider using some firewall system between your WordPress server and world. There are several options here. One option is to have a separate firewall device or server webween your WordPress server and Internet. It is a good idea to block everyhting you don&#8217;t need to access, and maybe route the web traffic thoiugh some proxy server that can filter out dangerous requests. <a href="https://www.cloudflare.com/">Cloudflare</a> is one well known company that sells cloud service for this (you route your web traffic through their service). If you want to run some protection software on your own server, check out <a href="https://www.modsecurity.org/">ModSecurity</a> open source application firewall. It has worked for me well (protects agants many nasty stuff), but can have some downsides (for example sometimes causes unexpected Internal Server Error problems when using management interface and the moderated comments contain certain keywords in them).</p>
<p class="entry-title">If your blog is very important to be always on-line (generated lots of money or donwtime causes lots of negative PR) and/or your blog talks on sensitive topics that someone might want to silence, be prepared to plan against DDoS (Distributed Denial of Service) attacks. It is hard to protect agains DDoS (lots of work for good protection), so you first need to think what level of protection you could need. <a href="http://www.cloudways.com/blog/ddos-attacks-wordpress-security/">How To Protect Your WordPress Website Against DDoS Attacks</a> article gives some ideas on how to plan DDoS protection. <a href="https://www.cloudflare.com/">Cloudflare</a> is one well known company that sells <a href="https://www.cloudflare.com/under-attack">cloud service for DDoS protection.</a></p>
<address><em>For some more tips read</em> <a href="http://codex.wordpress.org/Hardening_WordPress">Hardening WordPress</a><em> and </em><a href="https://blogvault.net/7-steps-secure-wordpress-virus-malware/">7 Steps to Secure your WordPress site from Viruses &amp; Malware</a>. </address>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2015/05/11/security-tips-for-wordpress-blogging/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>The Golden Age of Tech Blogging?</title>
		<link>https://www.epanorama.net/blog/2015/03/26/the-golden-age-of-tech-blogging/</link>
		<comments>https://www.epanorama.net/blog/2015/03/26/the-golden-age-of-tech-blogging/#comments</comments>
		<pubDate>Thu, 26 Mar 2015 08:13:48 +0000</pubDate>
		<dc:creator><![CDATA[epanorama]]></dc:creator>
				<category><![CDATA[Journalism and media]]></category>
		<category><![CDATA[Wordpress]]></category>
		<category><![CDATA[WWW dev]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=7574</guid>
		<description><![CDATA[<p>Is the golden age of Tech Blogging over or not? Here are two views: End of an Era: The Golden Age of Tech Blogging is Over article tells that like the film industry, the Golden Era is the emergence period, when fresh innovation in a new medium is born. New techniques, revolutionary content, and different <a class="moretag" href="https://www.epanorama.net/blog/2015/03/26/the-golden-age-of-tech-blogging/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Is the golden age of Tech Blogging over or not? Here are two views:</p>
<p><a href="http://www.web-strategist.com/blog/2011/12/27/end-of-an-era-the-golden-age-of-tech-blogging-is-over/">End of an Era: The Golden Age of Tech Blogging is Over</a> article tells that like the film industry, the Golden Era is the emergence period, when fresh innovation in a new medium is born. New techniques, revolutionary content, and different business models emerge as innovators pioneer a new medium.</p>
<p>Trend 1: Corporate acquisitions stymie innovation<br />
Trend 2: Tech blogs are experiencing major talent turnover<br />
Trend 3: The audience needs have changed, they want: faster, smaller, and social<br />
Trend 4: As space matures, business models solidify –giving room for new disruptors</p>
<p>The Future: A New Era is set to Emerge &#8211; Tech blogging isn’t dying, it’s evolving.</p>
<p>This is a normal part of any industry.</p>
<p><a href="http://www.sarahlacy.com/sarahlacy/2011/12/golden-age-of-tech-blogging-done-i-couldnt-disagree-more.htmlhttp://www.sarahlacy.com/sarahlacy/2011/12/golden-age-of-tech-blogging-done-i-couldnt-disagree-more.html">Golden Age of Tech Blogging Done? I Couldn&#8217;t Disagree More</a> article put out a view: No way. Unless of course, he means we&#8217;re about to enter the platinum age. Because things are far from dead in tech blogging&#8211; and blogging in general. In fact, I think we&#8217;re poised to enter one of the most exciting periods yet. I&#8217;m a big believer that tech trends tend to over-promise in the short term but under-promise in the longterm. Last few years demonstrated some of the limitations of blogging&#8211; ie, we can&#8217;t all make businesses and build big audiences, it won&#8217;t replace all older forms of media. In a lot of ways sites like Facebook, Yelp and Twitter have scratched that itch for self-expression by giving the masses an easier and more painless way to get the endorphin rush that blogging gave in the early day. But there are still plenty of people who love to write&#8211; not just share, Tweet and comment&#8211; for a living, and blogs are still the best platform for that. In many cases, blogs haven&#8217;t yet figured out a way to monetize their influence. Start out with a mindset not to sell.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2015/03/26/the-golden-age-of-tech-blogging/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Bad WordPress hole found</title>
		<link>https://www.epanorama.net/blog/2014/11/24/bad-wordpress-hole-found/</link>
		<comments>https://www.epanorama.net/blog/2014/11/24/bad-wordpress-hole-found/#comments</comments>
		<pubDate>Mon, 24 Nov 2014 15:38:49 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Wordpress]]></category>

		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=28574</guid>
		<description><![CDATA[<p>Worst WordPress hole for five years affects 86% of sites article tells a dangerous cross-site scripting (XSS) hole has been found in WordPress. It will affect millions of sites. An estimated 86 per cent of WordPress websites are vulnerable a dangerous cross-site scripting (XSS) hole in the popular comment system plugin &#8220;WP-Statistics&#8221;.  The WP-Statistics plugin <a class="moretag" href="https://www.epanorama.net/blog/2014/11/24/bad-wordpress-hole-found/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.theregister.co.uk/2014/11/24/worst_wordpress_hole_for_five_years_affects_86_of_sites/">Worst WordPress hole for five years affects 86% of sites</a> article tells<a href="http://klikki.fi/adv/wordpress.html"> a dangerous cross-site scripting (XSS) hole has been found in WordPress</a>. It will <a href="http://klikki.fi/adv/wordpress_press.html">affect millions of sites</a>. An <a href="http://klikki.fi/adv/wordpress_press.html">estimated 86 per cent of WordPress websites are vulnerable</a> a dangerous cross-site scripting (XSS) hole in the popular comment system plugin &#8220;WP-Statistics&#8221;.  The <a href="https://wordpress.org/plugins/wp-statistics/">WP-Statistics</a> plugin lets attackers inject JavaScript into comments, which can then infect reader computers or those of administrators.</p>
<p><a href="http://klikki.fi/adv/wordpress.html">Klikki Oy</a> security bod Pynnonen <a href="http://www.theregister.co.uk/2014/11/24/worst_wordpress_hole_for_five_years_affects_86_of_sites/">commented</a>: &#8220;An attacker could exploit the vulnerability by entering carefully crafted comments, containing program code, on WordPress blog posts and pages. Under default settings comments can be entered by anyone without authentication&#8221; and &#8220;probably the most serious WordPress core vulnerability that has been reported since 2009&#8243;.</p>
<p>The flaw has existed for about four years affecting versions between 3.0 to 3.9.2 but not in newest version 4.0. <a href="http://klikki.fi/adv/wordpress_press.html">Official patches were released on November 20</a>. They have now been deployed automatically to most WordPress sites. Reportedly the <a href="http://klikki.fi/adv/wordpress_press.html">Akismet comment plugin now also filters any malicious comments</a> containing the exploit.</p>
<p>So the users of 4.0 WordPress are safe from this, but they should note that  version 4.0.1 <a href="https://wordpress.org/news/2014/11/wordpress-4-0-1/" target="_blank">patched a separate and also critical</a> set of XSS flaws discovered by the internal security team, along with a cross-site request forgery hole.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2014/11/24/bad-wordpress-hole-found/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
