I thought I should write down this without delay and share with my readers. These are bits and pieces of my experiences of writing my official website sanjibsinha.com. It was a kind of trial and error method that I had always expected that, well – touch wood, it’d survive somehow.
And it survived the experiments. Google started indexing it and I think the time has also come to play with Google analytic.
Let me finish it very fast and start from the very beginning.
I decided to inject multiple bootstrap CSS styling in my website. It’s a kind of bootstrapping wordpress.
As you know, when you start building a wordpress site from scratch you need few files at the very beginning. They are – style.css and few more PHP files like index, page, home, header, footer, sidebar etc.
I decided to make the front page a static page so I injected a ‘front-page.php’ file in that beginning procedure.
As of now I am keeping three styles – two of them are open source bootstrap theme and the other one is the mystery (please download it from my github repository).
The first step is – make your default style intact so that it does not break.
My ‘style.css’ code:
Next get the link in the ‘header.php’ file:
I don’t want the ‘Home’ navigation in my first page menu bar so just excluded it with a simple code:
wp_list_pages(array('title_li' => '', 'exclude' => 4));
Remember wordpress keeps everything as ‘post’ inside database. My home page post id is 4 and I’m excluding it from the first page navigation.
You know the other wordpress pages more or less follow this same logic:
if ( have_posts() ) : while ( have_posts() ) : the_post();
I decide to get the permalink, time, title, and content after that so the functions are easy:
the_time('l, F jS, Y'); //you can change the format, please search in the codex
You should also keep an error message if something goes wrong with your code.
_e('Sorry, there are no posts.');
As I said before: there are three themes as of now. So I need two more template files. One is for Blog and the other, the custom one is for any other purposes.
You need ‘header-blog’, ‘footer-blog’, ‘header-custom’, and ‘footer-custom’. And in the related template file don’t forget to write like this:
Besides these simple routine I decided to show one category in my custom styling. I’ll write this part in detail.
Finally my website looks like this:
The Home page:
The blog Page:
The Contact page:
The archive page:
And finally I decided to show my ‘PHP’ category posts in the custom styling:
So this is it. For full code please visit my Github repository:
I’m currently working with facebook developers tools. Trying to merge with WordPress or any other PHP application that comes my way.
In fact reactivating my account was a part of that process.
I’ll keep this post updated so if you’re worried about losing your privacy to billions of people, you may stay in touch.
Does the future look too rosy for us, – the new digital India?
It’s not beyond reasonable reservation. While our government is pressing for cashless transaction, a thick mantle of fear hangs loosely around the wrong encryption policy and slack cyber security measures taken by AM-ADMI. It’s not a question-and-answer session anymore. It’s probably been answered already: we will be at a bigger loss if correct steps are not taken right away!
Continue reading “The Great Cyber Robberies Expose Our Sordid Underbelly!”
“Want to buy some profile dumps. Is there any? I’m ready to pay in Bitcoins.”
After posting this message in three “TOR NETWORK” message boards, hidden in the dark web, my wait was over after nearly twenty hours when an “Anonymous” asked in a “TORCHAN” board (http://zw3crggtadila2sg.onion/): “How we know you’re not an FBI scum”?
A real scummy question indeed! I wish I had a gentle reply!
It’ll attract more slang designed only for the dark web if you can’t prove that you’re not really an “FBI scum”. Other boards bore no fruit, at least not in twenty hours deadline I had set knowing that it was too short.
Continue reading “Not the Giant Corporations, Biggest Data Theft Hit Common People Most”
Above all things, it now appears that government has thrown all its weights around the seizure of black money. IT officials claim that the amount of unaccounted money recovered since the announcement of demonetization on 8th November has crossed three thousand crores and they’re counting for more. Before that government had also announced packages for black money disclosure that had ended on 30th September and till date the amount disclosed has been around 55 thousand crore rupees.
It’s been one side of reality.
Continue reading “Post demonetization: the heartbeat of black money now ticks with bitcoin”
It sounded like science fiction when we have first learned about the Ransomware. Cyber attackers swooping on computer network and lock the essential files encrypting them and demanded for a ransom that you had to pay in bitcoin – a currency that runs in the dark web. In the first part of this series of articles we also came to know how denial of service – an old tactic hackers use to jam the network – had been morphed into a new avatar.
Continue reading “Ransomware: How can I save my SOUL from cyber attacks?”
The real life kidnapping model has just morphed into a new avatar in the virtual world encrypting your essential files, demanding money, holding you as a hostage. Cyber criminals have now adopted the same ‘real-life’ kidnapping technique to snatch your valuable documents holding you for a hostage to make a deal. In such situations you need to buy your freedom for exchange of a ransom.
It sounds bizarre and almost like a science fiction but it starts taking place in our day-to-day life.
Continue reading “Ransomware is the new Threat: Pay the Kidnappers a Ransom and Obtain your Essential Files”
First, it was a mail from Pramila Balan, the acquisition editor of Apress. They wanted to publish my book on ethical hacking.
After a few more conversations they finally decided to publish two books – another one about Laravel that has been in the market nearly for a year or more.
My Books in Apress
I saw the whole development as a warning from my creator, probably the last warning; that simply says: grow up, life is too short and there are so many things to do.
My first book on Ethical Hacking is now available in Lanpub and Amazon.
here are the Contents:
What is Ethical Hacking?
How You Can Use Many Tools?
The Legal Side
Basic Hacking Terms
Build Your Hacking Environment
What Is VirtualBox?
Install Kali Linux & Other Operating Systems in VB
Linux Terminals and Basic Functionalities
Should I Know Any Programming Language?
Protect Your Anonymity on Internet
2) Proxy Chains
4) All About Mac Address
This book is intended for complete programming beginners or general people who know nothing about any programming language but want to learn ethical hacking. Ethical Hacking, by no means, is associated with any kind of illegal electronic activities. They always stay within laws. This book is intended for those people – young and old – who are creative and curious and who want to develop a creative hobby or take up internet security profession acting as ethical hacker.
Continue reading “Ethical Hacking for beginners”
In fact this steps can be followed for any Debian package.
It’s a few simple lines on Debian/Ubuntu distros Download the file Use Archive Manager to open it and extract it to a folder.
Open a terminal cd to the folder.
when in the folder cd DEBS to change into the DEBS folder.
In Kali, Type ‘su’ and by typing root password you become ‘root’. In other package like Ubuntu, type:
sudo dpkg -i *.deb
sudo dpkg -i *.deb (once again!)
Now you should see your OpenOffice in Usual Application – Office section of your kali Linux.