정보기술

Gnuboard linked completion

Based on the WordPress member DB, it was linked with Gnuboard to make it possible to write when logging in from BBS. Sharing cookies with sub domain Save the source below as "WP-SSO.PHP" on the server where the WordPress is installed.[PHP][/PHP]If there is no gnuboard session value and WordPress cookie value, module 2 is processed on the server to implement SSO (SINGLE SIGN ON) function If you have a gnuboard session value and the WordPress cookie value, you can empty the session and gangcy the page Nuboard ...

Bring jQuery from Google

Because of the traffic, the images and flash files were moved to another server and connected. JQuery finds the following source while surfing and connects to Google Modified File: Theme/Functions.php[PHP] //Making jQuery Google API function modify_jquery() { if (!is_admin()) { // comment out the next two lines to load the local copy of jQuery ...

WordPress, Gnu Board linkage

It is currently linked to WordPress and Gnuboard in Kilhonet. After stabilizing the site more, I tried to release the sauce, and I uploaded something made by the request of Gnuboard users. (http://sir.co.kr/bbs/board.php?bo_table=cm_free&wr_id=741180) In the future, I think that the pages generated from the WordPress are directly loaded from the Head.php and Tail.php of the Head.php, and the cash processing and content areas are divided up and down and output. Based on the WordPress member DB, it is linked to Gnuboard, when writing BBS posts ...

Modify the WordPress theme

It is a method of modifying the file that is backed up (represented by a child theme) without touching the original when modifying the WordPress theme. To easily check the children theme used, create a new folder in the "WP-Content/Theme" folder by combining the theme name. Copy the "Style.css" of the original theme to the child theme folder and "Theme Name", "Themplate" as below ...

Web hacking, dangerous code check program

Server hacking was made to easily check whether the malicious PHP was installed, monitoring and risk code. Write the code on the server account and upload it. Click the download button below to download the monitoring program. Run the downloaded program and enter the URL written in (1) in the URL (S). Click Diagnose to tell you the suspected file name as shown below. Not usually ...