The WordPress API has a huge learning curve, so you might miss authentication and authorization checks when you code your first plugin. This article will explain how an authentication failure…
Programming
Discuss all things programming
The WordPress plugin All-In-One Sticky Floating Contact Form was found to have a vulnerability involving authorization bypasses. When you develop plugins for WordPress, it’s important to ensure that the user…
You probably know that your HTTP requests will likely use TLS (Transport Layer Security) to create an encrypted connection, but most developers don’t know what happens in a client-server connection…
When a software developer codes a variable into their application, the system allocates a specific number of bytes to hold data. Usually, the data passed to the variable is from…
I recently looked into what it would take to start a career in machine learning. I did a lot of research and combined everything you need to know to get…
The Upwork API has several endpoints that can be used to search freelancers, manage jobs and messages, and get reports. Most of the functionality for the web UI for both…
If you’ve looked at your site from Chrome Developer Tools and use an SSL certificate that you purchased from Symantec, you probably see the following warning: The SSL certificate used…
Need someone to write your ICO white paper? Contact me at jennifer [at] pinkhatcode.com. In Jan 2017, Bitcoin’s value was approximately $950. Cryptocurrency was expected to increase in popularity, but few…
In the last article, I showed you how to extract images from a Word document. In this article, I’m going to use some of the same code and expand it…
I created a tool called WordPress Auto Publisher that extracts content from a Word document and uploads it to a user’s WordPress blog. One thing I had to include was…
