Listing Categories in Magento 1.4.1.1 & Above Firstly, you need to make sure the block that you’re working is of the type catalog/navigation. If you’re editing catalog/navigation/left.phtml then you should be okay. In my previous example, we used the Category model to load in category information. This can be slow and often loads in more Full Article…
Search the Wiki
Jira – Installing on Linux
Before you begin We strongly recommend that you install the latest production version available. If you install an older version of JIRA, it may contain security vulnerabilities that were patched or fixed in subsequent versions. If you have to install an older version, check if there are any security advisories that apply to the version. Note, it Full Article…
AWS – Custom configuration for RDS instances
Amazon RDS instances are convenient and scalable. However, whilst running long-running workflows with large datasets, the servers can come under considerable strain at times. Sometimes, we have noticed that certain transactions return with an error – not because something is wrong with the transaction syntax, rather that the MySQL server believes that the transaction is Full Article…
AWS ELB – How to force HTTPS
In the most common configurations, when running your web app behind Nginx or Apache, your https:// request will get redirected to http://. Sometimes, you may want to rewrite all HTTP requests to HTTPS. The Amazon Elastic Load Balancer (ELB) supports a HTTP header called X-FORWARDED-PROTO. All the HTTPS requests going through the ELB will have Full Article…
Nginx – Fixing 502 bad gateway
Many times we can browse the web and find a 502 bad gateway error at Nginx. There are a few reasons why you will find this message in your webserver log, and here we will teach you how to fix it. When you will find 502 bad gateway error: Nginx running as proxy for Full Article…
cPanel – logs for access, Apache, email, error, ftp, mysql, and WHM
cPanel logs most activity that happens on a server to log files so you can go back and review log entries for problems, instead of having to be on the server at the time of them happening. This guide will cover the locations of the log files for things such as access logs, Apache web Full Article…
SSL – v3 goes to the dogs – POODLE kills off protocol
Over the past week, rumours were circulating about a new vulnerability in SSLv3. No details were widely available until today and now we have POODLE, the ‘Padding Oracle On Downgraded Legacy Encryption’ attack. The attack, specifically against the SSLv3 protocol, allows an attacker to obtain the plaintext of certain parts of an SSL connection, such Full Article…
Gmail – How to unlock captcha and enable less secure apps
If you want to use Gmail to send email for your website, you will need to use SMTP to configure Gmail as a sender. But your functions can’t log in Gmail, because the security options in Gmail. You need to unlock it if you want to use Gmail for your website. Here is the steps: Full Article…
Magento – Security tips and vulnerabilities
The term “hacker” was coined in the 1960th by the group of programmers from the Massachusetts Institute of Technology and originally meant a person who looked for a way to smartly make things more functional and useful. But nowadays it usually possess a negative meaning referred to computer criminals. E-commerce and financial sites stand first Full Article…
CSS – Understanding the viewport meta tag
Understanding the viewport meta tag, CSS @viewport and making an automatic link to your app. The use of meta tags is not actually a W3C specification. Despite that, due to the ubiquity of iOS devices and WebKit in general, they have become a de-facto standard. Let’s wrap our hands around them… In short, they offer Full Article…