My WP-Polls and WP-Sticky have been mentioned in Mashable: 20+ Must-Have WordPress 2.5 Compatible Plugins.
This is the second time Mashable has mentioned my plugins.
Thank you Mashable!
Lester Chan's WordPress Plugins Development Blog
My WP-Polls and WP-Sticky have been mentioned in Mashable: 20+ Must-Have WordPress 2.5 Compatible Plugins.
This is the second time Mashable has mentioned my plugins.
Thank you Mashable!
WordPress 2.5 has been released and WordPress.org has a refreshed look based on WordPress 2.5 new redesigned administration backend.
New User Features in WordPress 2.5
New Developer Features in WordPress 2.5
Download: WordPress 2.5
I have upgraded this site to WordPress 2.5.
I got 3 reports regarding and error that says “Cannot redeclare function …”. 2 from here and 1 from here.
This is likely that you did not follow the upgrading instructions as stated in the readme.html (but I maybe wrong though).
When updating a plugin, please make sure you DEACTIVATE the plugin first before launching your FTP software to overwrite the files. BUT the best way is to delete that particular plugin folder altogether instead of overwriting it.
When updating WordPress, always DELETE everything EXCEPT your .htaccess, wp-config.php and wp-content folder. After that, then you upload the files in the zip that you have downloaded and run upgrade.php.
WordPress 2.9 RC1 has been released. Check out all the new stuff in WordPress 2.9.
Upgraded this site to WordPress 2.9 RC1, my plugins seems to work well.
Changelog WordPress 2.9 RC1
Download: WordPress 2.9 RC1
http://wordpress.org/development/2007/03/upgrade-212/trackback/
WordPress 2.1.2 has been released and I have updated this site to WordPress 2.1.2.
It is an emergency release, so I urged all of you to upgrade it.
Here is what happen, copied + pasted:
This morning we received a note to our security mailing address about unusual and highly exploitable code in WordPress. The issue was investigated, and it appeared that the 2.1.1 download had been modified from its original code. We took the website down immediately to investigate what happened.
It was determined that a cracker had gained user-level access to one of the servers that powers wordpress.org, and had used that access to modify the download file. We have locked down that server for further forensics, but at this time it appears that the 2.1.1 download was the only thing touched by the attack. They modified two files in WP to include code that would allow for remote PHP execution.
Remember to overwrite EVERY files/folders except those in the ‘wp-content’ folder.