WordPress 2.5

WordPress 2.5 has been released and WordPress.org has a refreshed look based on WordPress 2.5 new redesigned administration backend.

New User Features in WordPress 2.5

  • Cleaner, faster, less cluttered dashboard
  • Dashboard Widgets
  • Multi-file upload with progress bar
  • Bonus: EXIF extraction
  • Search posts and pages
  • Tag management
  • Password strength meter
  • Concurrent editing protection
  • Few-click plugin upgrades
  • Friendlier visual post editor
  • Built-in galleries

New Developer Features in WordPress 2.5

  • Salted passwords
  • Secure cookies
  • Easy taxonomy and URL creation
  • Inline documentation
  • Database optimization
  • $wpdb->prepare()
  • Media buttons
  • Shortcode API

Download: WordPress 2.5

I have upgraded this site to WordPress 2.5.

1 Star2 Stars3 Stars4 Stars5 Stars (31 votes, average: 3.68 out of 5)

Error: Cannot redeclare

I got 3 reports regarding and error that says “Cannot redeclare function …”. 2 from here and 1 from here.

This is likely that you did not follow the upgrading instructions as stated in the readme.html (but I maybe wrong though).

When updating a plugin, please make sure you DEACTIVATE the plugin first before launching your FTP software to overwrite the files. BUT the best way is to delete that particular plugin folder altogether instead of overwriting it.

When updating WordPress, always DELETE everything EXCEPT your .htaccess, wp-config.php and wp-content folder. After that, then you upload the files in the zip that you have downloaded and run upgrade.php.

1 Star2 Stars3 Stars4 Stars5 Stars (22 votes, average: 3.68 out of 5)

WordPress 2.1.2

http://wordpress.org/development/2007/03/upgrade-212/trackback/

WordPress 2.1.2 has been released and I have updated this site to WordPress 2.1.2.

It is an emergency release, so I urged all of you to upgrade it.

Here is what happen, copied + pasted:

This morning we received a note to our security mailing address about unusual and highly exploitable code in WordPress. The issue was investigated, and it appeared that the 2.1.1 download had been modified from its original code. We took the website down immediately to investigate what happened.

It was determined that a cracker had gained user-level access to one of the servers that powers wordpress.org, and had used that access to modify the download file. We have locked down that server for further forensics, but at this time it appears that the 2.1.1 download was the only thing touched by the attack. They modified two files in WP to include code that would allow for remote PHP execution.

Remember to overwrite EVERY files/folders except those in the ‘wp-content’ folder.

1 Star2 Stars3 Stars4 Stars5 Stars (132 votes, average: 3.67 out of 5)