Les nouveautés et Tutoriels de Votre Codeur | SEO | Création de site web | Création de logiciel

Seo Master present to you: Emoticons/Smileys are a great way of making discussions more interesting and fun, so it's a pity that Blogger don't support them. This tutorial will show you some simple steps on how to add some very cute emoticons called Kolobok to your Blogger/Blogspot comments, so that you and your blog visitors will be able to have an enjoyable time together.

Now available for threaded commenting system too!
emoticons in blogger, kolobok smileys, threaded comments



How To Add Kolobok Smileys In Blogger Comments

Step 1. Go to Dashboard - Template - Edit HTML - Proceed


 Step 2. Expand Widget Template (make a backup)


    Step 3. Search (CTRL + F) for this tag:

    </body>

    Step 4. Copy and paste just above it, this code:

    • For previous commenting system (comments without reply option)
    <!--kolobok-smileys-->
    <script src='http://helplogger.googlecode.com/svn/trunk/[www.matrixar.com]smileys.js' type='text/javascript'/><noscript><a href='http://www.matrixar.com/2012/04/how-to-add-emoticonssmileys-in-blogger.html' target='_blank'><span style='font-size: x-small;'>Add emoticons</span></a></noscript>
    <!--kolobok-smileys-->

    • For threaded commenting system (comments with reply option)
    <script src='https://helplogger.googlecode.com/svn/trunk/kolobok threaded.js' type='text/javascript'/>

    Note: ignore steps 5-8 if you are using threaded comments!

    Step 5. Now find this code snippet:

    <b:loop values='data:post.comments' var='comment'>

    Step 6. Paste the following code just above it:

    <div id='smileys'>

    Step 7. Find the following code (look carefully, it should be somewhere below the code from step 5)

    </b:loop>

    Step 8. Paste the following tag just after it:

    </div>

    Step 9. Now find this code:

    • For previous commenting system:
    <data:blogTeamBlogMessage/>

    Note: if you'll find it like 4 times, stop to the 2nd one!

    • For threaded commenting system:
    <div class='post-footer-line post-footer-line-3'>

    Step 10. And add this code just after it:

    <b:if cond='data:blog.pageType == &quot;item&quot;'><script type='text/javascript'>
    //<![CDATA[
    function moreSmilies() {
        document.getElementById('smiley-more').style.display = 'inline';
        document.getElementById('smiley-toggle').innerHTML = '<a href="javascript:lessSmilies()"><div style="font-size:small; font-weight:bold;color:#000000;">Hide Emoticons /<a href="http://www.matrixar.com/2012/04/how-to-add-emoticonssmileys-in-blogger.html">Add Emoticons</div></a></span>';
    }
    function lessSmilies() {
        document.getElementById('smiley-more').style.display = 'none';
        document.getElementById('smiley-toggle').innerHTML = '<a href="javascript:moreSmilies()"><div style="font-size:small; font-weight:bold;">Show Emoticons</div></a>';
    }
    //]]>
    </script>
    <div class='emoticons'>
    <span id='smiley-more' style='display: none;'>
    <img src='http://www.matrixar.com/-k4ujC23cSgI/UTIq7eUkmuI/AAAAAAAABAQ/YUNL9_RhDB0/s1600/smile3.gif'/>:)
    <img src='http://www.matrixar.com/-XSBJ7zBZKZs/UTIrT-hMYyI/AAAAAAAABAY/6B26_8Ttwj4/s1600/sad.gif'/>:(
    <img src='http://www.matrixar.com/-Ph2wxEvy2mc/UTIr8-fdHjI/AAAAAAAABAo/3use2PsPhMA/s1600/taunt.gif'/>:))
    <img src='http://www.matrixar.com/-pcE-4ot-gjk/UTIsLRff6SI/AAAAAAAABAw/LYvZ8__88Ak/s1600/cry2.gif'/>:((
    <img src='http://www.matrixar.com/-lNNTReQVc0A/UTIrjDhVLAI/AAAAAAAABAg/BsVMYnr54pI/s1600/rofl.gif'/>=))
    <img src='http://www.matrixar.com/-8C5UH12mxf0/UTIzmsxczDI/AAAAAAAABDA/2seHdqLVQ6Q/s1600/suicide.gif'/>=D&gt;
    <img src='http://www.matrixar.com/-lhTywmMZ58E/UTI04kjJ3WI/AAAAAAAABDY/qNgtijEr_E8/s1600/biggrin.gif'/>:D
    <img src='http://www.matrixar.com/-gG_Wn6D6Ux4/UTIyqFyfKbI/AAAAAAAABCo/qEmU8s8ndVI/s1600/tongue.gif'/>:P
    <img src='http://www.matrixar.com/-Zb5g0OWHx4c/UTIsuPLt90I/AAAAAAAABA4/cmP1ltBmVF0/s1600/shock.gif'/>:-O
    <img src='http://www.matrixar.com/-TSIzPWeGBwk/UTI0S-nw5tI/AAAAAAAABDQ/xyHPCFZH4fI/s1600/think.gif'/>:-?
    <img src='http://www.matrixar.com/-qpnD1BYon5w/UTI0AIeKX6I/AAAAAAAABDI/HsllV7NYTqk/s1600/unsure.gif'/>:-SS
    <img src='http://www.matrixar.com/-SpvC8mHHwhg/UTIzQMUVGKI/AAAAAAAABCw/_NKKVyQtulk/s1600/flowers1.gif'/>:-f
    <img src='http://www.matrixar.com/-qlyn_deOhFw/UTIzY8aRgqI/AAAAAAAABC4/pfSojMdD33s/s1600/doh.gif'/>d(
    <img src='http://www.matrixar.com/-H4e_O5BFVP8/UTIumwhVmKI/AAAAAAAABBw/SKhY4DDxKkk/s1600/air_kiss.gif'/>:-*
    <img src='http://www.matrixar.com/-h4yNmhdKUVU/UTIwUKpvVOI/AAAAAAAABCY/B0FEZVRGHe4/s1600/threaten.gif'/>b-(
    <img src='http://www.matrixar.com/-veVoDPEc7I4/UTIv9wCS0jI/AAAAAAAABCQ/4c5FgCHAiU4/s1600/help.gif'/>h-(
    <img src='http://www.matrixar.com/-_ttAcnBbAaw/UTIvKtxfWvI/AAAAAAAABCA/X2JLEShhOQU/s1600/good.gif'/>g-)
    <img src='http://www.matrixar.com/--o9jZ1nMcec/UTIuyCBgS_I/AAAAAAAABB4/Jf03oz5yKrU/s1600/beee.gif'/>5-p
    <img src='http://www.matrixar.com/-6-BTJcVpwY0/UTIvhF_PL-I/AAAAAAAABCI/SS-LDADTSls/s1600/yahoo.gif'/>y-)
    <img src='http://www.matrixar.com/-khAwhIYbgvQ/UTItD_PfNyI/AAAAAAAABBI/HMpRMQh5Uak/s1600/crazy.gif'/>c-)
    <img src='http://www.matrixar.com/-fsTXhXl10Gg/UTIs7Ll01AI/AAAAAAAABBA/QkWgWAAFG3g/s1600/spiteful.gif'/>s-)
    <img src='http://www.matrixar.com/-CIuUuJeuyGI/UTIueHgTxOI/AAAAAAAABBo/BzXkTEEDlhw/s1600/drinks.gif'/>d-)
    <img src='http://www.matrixar.com/-Mc5ed3Ymk7s/UTI1GIXMAMI/AAAAAAAABDg/PyDOfoXgsl0/s1600/cheer.gif'/>w-)
    <img src='http://www.matrixar.com/-JOgaMRI61Jk/UTItsGc5KdI/AAAAAAAABBY/6UDCabfZQbg/s1600/hi+2.gif'/>:-h
    <img src='http://www.matrixar.com/-wmOB_Z6LPp4/UTIt9FhZiwI/AAAAAAAABBg/7VoefgIQjEs/s1600/give_heart.gif'/>:X
    </span>
    <span id='smiley-toggle'><a href='javascript:moreSmilies()'><div style='font-size:small;font-weight:bold;'>Show Emoticons <img src='http://www.matrixar.com/-k4ujC23cSgI/UTIq7eUkmuI/AAAAAAAABAQ/YUNL9_RhDB0/s1600/smile3.gif'/></div></a></span>
    </div></b:if>

    Note: Ignore steps 11-12 if you are using threaded comments!

    Step 11. Finally, find this code

    ]]></b:skin>

    Step 12. Add this one below, just above ]]></b:skin>

    .emoticons {-moz-background-clip: -moz-initial;-moz-background-origin: -moz-initial;-moz-background-inline-policy: -moz-initial;text-align: left;width:400px;}
    .emoticons a, .emoticons a:hover {margin-left: 20px;text-decoration:none;}

    Note: if you want to change the size of the emoticon container, edit the red code.

    Step 13. Save the Template and you're done. Enjoy!

    If you have any problem and need help, please leave a comment below.
    2013, By: Seo Master
    Seo Master present to you:

     owasp top vulnerability | Cross site scripting XSS | SQLI | CSRF | LFI | RFI

     Ethical Hacking is very important part for the website and other domain. Now a day’s Hacker easily access on the website. With the common mistakes of developer’s, website owner has been in trouble. As I am security Researcher I have also found 1000 of security flaw in website. I have reported it. Like Microsoft, opera, adobe, Nokia, Braintree, soundcloud, eBay. But now a day’s Hackers easily access on website database. But in the same way Ethical hacker’s (Security Researcher) or white hacker’s done the job. And save the website from the black hat hacker’s. There are lots of security flaws (vulnerability) in website. According the open web application security project (OWSAP) there are lots of security flaw in website. This is top ten security flaw as follow 


     owasp top vulnerability

    A1 – Injection

    Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data.

    A2 – Broken Authentication and Session Management 

    Application functions related to authentication and session management are often not implemented correctly, allowing attackers to compromise passwords, keys, session tokens, or exploit other implementation flaws to assume other users’ identities.

    XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation or escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites.

    A4 – Insecure Direct Object References

    •A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, or database key. Without an access control check or other protection, attackers can manipulate these references to access unauthorized data.

    A5 – Security Misconfiguration

    Good security requires having a secure configuration defined and deployed for the application, frameworks, application server, web server, database server, and platform. All these settings should be defined, implemented, and maintained as many are not shipped with secure defaults. This includes keeping all software up to date.

    A6 – Sensitive Data Exposure

    Many web applications do not properly protect sensitive data, such as credit cards, tax ids, and authentication credentials. Attackers may steal or modify such weakly protected data to conduct identity theft, credit card fraud, or other crimes. Sensitive data deserves extra protection such as encryption at rest or in transit, as well as special precautions when exchanged with the browser.

    A7 – Missing Function Level Access Control

    Virtually all web applications verify function level access rights before making that functionality visible in the UI. However, applications need to perform the same access control checks on the server when each function is accessed. If requests are not verified, attackers will be able to forge requests in order to access unauthorized functionality.

    A8 - Cross-Site Request Forgery (CSRF)

    A CSRF attack forces a logged-on victim’s browser to send a forged HTTP request, including the victim’s session cookie and any other automatically included authentication information, to a vulnerable web application. This allows the attacker to force the victim’s browser to generate requests the vulnerable application thinks are legitimate requests from the victim.

    A9 - Using Components with Known Vulnerabilities

    Vulnerable components, such as libraries, frameworks, and other software modules almost always run with full privilege. So, if exploited, they can cause serious data loss or server takeover. Applications using these vulnerable components may undermine their defenses and enable a range of possible attacks and impacts.

    A10 – Unvalidated Redirects and Forwards

    Web applications frequently redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages. Without proper validation, attackers can redirect victims to phishing or malware sites, or use forwards to access unauthorized pages.

    So this is top ten vulnerability which is very common. So in my next tutorials I will explain you that how to find a vulnerability in website. If you have any problem regarding vulnerability so comment below or you can directly contact with me. click here
    2013, By: Seo Master
    Seo Master present to you:



    The big buzz continues to revolve around our Google App Engine launch. We are seeing a host of applications being developed, and were even pleasantly surprised to see people port the APIs allowing you to run App Engine code elsewhere, such as appdrop.com.

    One interesting feature to the App Engine which you may not have noticed, is the integration with Google Apps. Not only can you tie an application to your domain (allowing you to have myapp.mydomain.com instead of myapp.appspot.com) but you can restrict access to the given application to only members of your domain. If I ran a company on Google Apps, this would be a nice addition. I could see the small business apps that I need running there.

    Jeff Scudder then released a new version of the Google data Python client library which has support for Google App Engine and the Contacts API. If you want to use this in your Google App Engine application you simply need to set gdata.service.http_request_handler = gdata.urlfetch to make sure your requests have a path out!

    Google Docs offline, and Gears

    I was on the road, speaking about Gears and the Open Web in Europe last week, and it was perfect timing to be mixing with the community as Google App Engine came out and I could talk to that too. We also had a few things to talk about with Gears.

    We have been getting lots of questions surrounding our stance with the various standards out there, so Aaron Boodman put down our thoughts on the matter in a piece called Gears and Standards. It talks about how we are working with HTML5, and the direction that you will see Gears going. I think it is incredibly exciting to see people realise how Gears is a lot more than "offline", and is actually an open source way to teach browsers new tricks.

    Brad Neuberg talked about just that as well as new features in Gears, and tools to help you get your work done, such as PubTools. He also discussed our first Google Gears for Mobile application, done by the Picasa Team. Now the blokes in London can show off pictures of their kids as they slow poke through the city down in the tube.

    The biggest news of all though was the launch of Google Docs offline. If you have ever been in the situation where the internet goes flaky right when you just need that bit of info in document, no more. Now you have the option to save docs locally on your computer, so you can access them no matter where you are.

    If you would like a refresher course on how to get started with Gears check out Ben Lisbakken's new screencast.

    Fun with Maps

    The Geo side of the house continued to output great content, including a series of Geo Developer content:
    • Quick & Dirty KML Creation: With Mano Marks, Pamela Fox, and Christiaan Adams
      A demonstration of creating KML visually in Google Earth & Google Maps, and using Spreadsheet Mapper 2.0
    • Creating Custom Maps: With John Coryat
      A comparison of various ways of overlaying data in the Maps API and an in-depth explanation of creating tile layers and custom map types
    • GigaPan In-Depth: With Randy Sargent & Ted Morse
      A demo of the GigaPan panorama-browsing website and KML files, plus a technical explanation of PhotoOverlay
    • Dynamic KML: With Mano Marks & Brian Hamlin
      An exploration of using dynamic queries from KML, using the NetworkLink, httpQuery, and viewFormat elements, plus a demo of a PostGIS-generated NetworkLink
    • Mars, Moon, and Sky Map Types: With Noel Gorelick
      A talk introducing the non-Earth Maps API map types, plus cool demos of other types of projections used with planetary imagery
    • Mapping the Votes: With Michael Geary
      A whirlwind tour of what it took to create the Elections 2008 Map/Mapplet/Gadget, including SHPfile conversion, Javascript optimization, centroid calculations, Twitter updates collection, Mapplet API tricks, and more.
    • Google API Talks - Android, KML, Google Maps, Gadgets
      A series of 5-minute talks by various developers and Googlers given before Geary's presentation, including an intro to Gadgets/Mapplets.

    They were also happy to announce that KML is now a standard, and owned by the Open Geospatial Consortium. We have seen a lot of other sites consume and produce KML, so this is a great step.

    Finally, a great new feature was added to Google Maps. You can now check out traffic patterns in the future. If you have a commute the following morning, you can check out an estimate of how stuck you will be based on past experience. Obviously, it can't determine if there will be any crashes or anything like that :)

    And there's more...

    To finish up, a few other interesting items of the week:

    I hope you had a great week. Remember that our big developer event Google I/O is now just a few weeks away! We have a few posts from presenters who will be at the event to give you a little look at the content, but the best part will be having the community together to talk in the open.2013, By: Seo Master
    Powered by Blogger.