#76 – Alex Standiford on How WordPress and the Fediverse Can Be Combined
…Full post on WP Tavern
Read Full
…Full post on WP Tavern
Read Full
A few weeks ago, WP Ninjas announced it was stepping into the media optimization plugin market. The team released its Remove Unused Media plugin as a commercial project for tidying storage space. I received a full copy of it and put it through the ropes. With so many commercial plugins, I am accustomed to the…
Over the weekend, Nick Bohle asked Ellen Bauer of Elma Studio how post formats fit into the block-theming world. The question was a proposal for her a WordPress theme and FSE chat she held yesterday via Twitter Spaces. I could not attend and see if Bauer touched on the subject, but the question is something…
WooCommerce has shipped version 5.5.2 as a follow-up to the forced security update that patched a SQL Injection vulnerability last week. The vulnerability impacted versions 3.3 to 5.5 of the WooCommerce plugin, as well as versions 2.5 to 5.5 of the WooCommerce Blocks feature plugin. The team created a patch for more than 90 releases, which was sent as…
With WordPress 5.9 only just stepping its toes out the door and greeting the world, the lead developers seem to have hardly taken a moment to catch their breath. Yesterday, Matías Ventura posted the preliminary roadmap for 6.0. It covers the general scope of the planned features to land this year. Version 6.0 is expected…
Transcript [00:00:00] Nathan Wrigley: Welcome to the Jukebox podcast from WP Tavern. My name is Nathan Wrigley. Jukebox is a podcast which is dedicated to all things WordPress. The people, the events, the plugins, the blocks, the themes, and in this case, the revamp of the WordPress showcase website. If you’d like to subscribe to…
It’s common knowledge that WordPress themes and plugins can make your site more vulnerable to attack. However, third-party libraries can also leave your site susceptible to hackers. Fortunately, there are steps you can take to protect your WordPress installation – even when the security loophole originates from third-party code. This has never been more important,…