Computer Geeks and Garden Gnomes

First and foremost before I begin my ranting it is worth mentioning that there are many very helpful and considerate people out there in the cyber wilderness who devote much of their time to providing open source and free scripts of all variations from PHP, CGI and Java to name but a few. They provide dedicated support, do not insist on payment, and spend much of their free time helping you avoid having to part with your hard earned cash to get free programs and scripts up and running on your websites.

Now, that having been said I have just spent an enlightening couple of days installing several PHP and CGI scripts, mainly because whilst I have some experience of installations, the only true way to become fast and efficient with all this geeky stuff is to install, de install and test a variety of applications and programs yourself.

After two days and over a hundred scripts I am left drained. Half of the scripts I just dumped immediately due to poor or non-existent documentation and bad layout of files. It amazes me that some quite intricate scripts are left high and dry without any installation documents at all. In other words, the author spent days programming and putting together complicated scripts, to fail miserably on poor or non existent documentation. Aside from this, some sites you visit in order to download this material insist on blitzing you with numerous pop ups ? the end result of which is neither good for the person visiting the website or the website owner. Both part very quickly. Perhaps I am intolerant but any sign of boxes leaping up in the air and blind adverts and I am gone. I know I am not alone.

Add to this the frustration of taking the time to read through endless documents and CGI scripts on websites only to find that when you click on a link for more information or a download you find it is dead, the site under maintenance or what was advertised as free is not actually free. Either that or you go to the extreme of getting a script working only to find the writers advertisement popping up all over the place to the extent it warrants dumping the script. Yes I know you can remove it for a fee but why didn't you tell me that before I installed it?

Even quite clear documentation often omits what is to the writer an obvious requirement but not something that he or she chooses to share with their hapless user ? classic example might be forgetting to mention that an SQL database is needed. Hardly a minor omission.

At the height of one frustrating and particularly badly written install attempt I imagined myself as John Cleese with a garden gnome under my arm hunting for the writer. Anonymity on the internet does has its advantages in this case.

Now, I know you will be cynical and say that most of this is down to the fact that many script writers are hoping you will pay them to install their scripts for you, indeed many do offer installation services. This really is a bad way of advertising your services. There are plenty of people who will have trouble with the easiest installs and if you wrote clear and concise documentation which any user can see is genuinely comprehensive, you are more likely to secure customers as a result of failed installs.

During this laborious exercise we went through scripts of all kinds some of which include; online photo albums, content management systems, member login and authentication scripts, virtual postcards, email programs, hosting scripts, live helper, communication, e commerce, shopping carts, quiz and chat programs to name but a few. We also purchased 3 scripts. Only one of those free scripts was simple to install and marginally better than the free versions available. Paying money does not necessarily mean better service. In fact one photo album provider charging around $30 dollars per script provided bad install information and less than helpful advice, immediately deleting anything that mentioned install problems from his forum.

It has been an experience. If none of this has meant anything to you and you have no idea about scripting or installing scripts then consider yourself fortunate and leave it to the geeks if you are able.

For those of you that regularly dive into scripting for your websites ? here is a useful tip that saved us no end of time and frustration. The minute you come up against bad scripting, bad documentation or difficult to install scripts ? trash them, ditch them and move on. There are plenty of others. Leave the tricky badly written stuff to the real hardcore freaks.

Birmingham UK Com. For some free E Books visit: http://www.birminghamuk.com/shop/upload/.

Airbnb cleaning service Arlington Heights ..
In The News:

Red flags like processing fees, urgent countdowns and requests for full Social Security numbers expose fraudulent settlement sites targeting consumers.
Comprehensive analysis of Google Maps, Waze and Apple Maps examines usability, routing accuracy, data handling and features across the top navigation platforms.
Expert analysis reveals whether wired Ethernet or wireless Wi-Fi connections are safer for home internet use, plus practical steps to secure your network from attackers.
Australian construction robot Charlotte uses sand, crushed brick and recycled glass to 3D print fireproof, floodproof homes with reduced carbon footprint.
Cybercriminals are using fake invitation emails to trick recipients into downloading malware and stealing personal information and data.
Flying drones could help retailers fight a 93% increase in theft rates as Flock Safety promotes airborne security systems to track suspects and deter crime.
The Fox News Artificial Intelligence Newsletter brings you the latest news on the emerging technology every Saturday, highlighting top stories.
Hacker group Radiant stole data from 8,000 children at Kido nursery chain, demanding ransom and directly contacting parents with intimidation tactics.
As 18 states implement bell-to-bell cell phone bans, creative students use Google Docs, iMessage on MacBooks and Post-It notes to stay connected in class.
A sheriff's captain says deputies often spend hours writing reports between calls, but Axon's AI program, Draft One, helps them save crucial time in the field.
Sora 2, OpenAI's new video-generation app, can create AI-generated videos based on a singular prompt. The results are both mind-blowing and terrifying.
iPhone and Android users can reduce Wi-Fi calling battery drainage through settings adjustments, background app limits and stronger Wi-Fi connections.
Work email scams are becoming harder to detect as criminals use AI and spoofed addresses to trick employees into opening malicious attachments and links.
From her Arizona living room, Christina Chapman ran a covert hub that helped North Korean operatives infiltrate U.S. firms, netting $17 million in stolen salaries.
UC Santa Barbara researchers developed a soft robotic intubation system that achieved 100% success rates for experts and 96% for paramedics with minimal training.
Scammers exploit probate filings to target grieving families with fake fees and debts, Kurt "Cyberguy" Knutsson reports.
Automotive giant Stellantis becomes latest victim of widespread Salesforce breaches affecting companies like Google, Cisco and Adidas this year.
A woman from Washington reunited with her missing Maine Coon cat Louie after 11 days using Love Lost, a free AI-powered pet recovery platform.
Expert cybersecurity tips help Mac owners remove malware infections and strengthen defenses with antivirus software, password managers and system updates.
Meta's AI chatbot training rules bans sexual roleplay with minors and block access to child abuse material as regulators scrutinize its safety measures.
Online banking users face a new threat: web injection scams that overlay fake pop-ups to steal logins. Here’s how to spot them and protect your accounts.
Meta introduced Teen Accounts to Facebook and Messenger while launching a School Partnership Program for U.S. educators to report bullying within 48 hours.
Executive order signed by President Donald Trump tasks Robert F. Kennedy Jr.'s MAHA Commission with using AI to find new cures for childhood cancers.
New FileFix attack tricks Facebook and Instagram users into running malicious PowerShell commands disguised as Meta account maintenance to deploy StealC infostealer.
Step-by-step instructions help users migrate to Windows 11 while preserving emails, contacts, documents, and software licenses during the transition.

The Importance Of Email Backup

Viruses, software failures, power failures, human errors, hard drive failures... Read More

Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More

Favorite Things To Do With Home Technology

Save money. Save 10-15% on utility bills per month. Work... Read More

2 PC Annoyances and How To Solve Them!

I have a love-hate relationship with my computer.In fact, often... Read More

Digital Cameras: Hot Gear with the Coolest Features!

Cameras: still known for taking pictures but assumed as digital... Read More

How to Set Up Simple File Sharing WinXP

The first step is: Start > My DocumentsSo you have... Read More

Anti-Skip Protection on Mp3 Players

There have been some questions on anti-skip protection on mp3... Read More

Why There Are Color Differences in Printing from Your PC

This article describes the basic properties of color, what the... Read More

Your Affiliate Business - Peripherals, Software, Computers

I have always been interested in computers, but in the... Read More

SOBIG.F Virus Promises Ill Be Back

On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More

How To Remove One Operating System from a Dual Boot Windows XP Computer

In Windows Xp, you can install two operating systems on... Read More

Bios Term

BIOS - Basic Input Output SystemThe central processing unit of... Read More

Learning To Navigate Ciscos Online Documentation

When studying for your Cisco CCNA, CCNP, or CCIE exam,... Read More

How I Started Working With 3D Modeling Programs

So I'll start from the very beginning.One day I was... Read More

Refurbished Computers on the Internet

What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More

PDA Bible Free Download

Your Bible At Your FingertipsIt is fairly easy to find... Read More

Cisco Certification: A Survival Guide To The Cisco Cable Jungle

One of the most confusing parts of beginning your Cisco... Read More

Repairing A Corrupt .RAR/.ZIP Archive

Step 1:Open WinRAR and browse to the folder with your... Read More

Get Ahead When You Build Your Own Computer

If you've been kicking around the idea of building your... Read More

Passwords and the Human Factor

Passwords have a strange dual nature. The stronger and safer... Read More

FTP - File Transfer Protocol Explained

File Transfer Protocol (FTP) is a protocol that is part... Read More

Palm PC critique

I met an entrepreneur who hole heartedly disagree with an... Read More

An All Too Familar Pain

Lost & Found for the 21st CenturyIn today's hectic world... Read More

A Beginners Guide to Avoiding Viruses

"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus... Read More

7 Reasons NOT to Take Your Laptop on Holiday!

Heading off on vacation soon?Then perhaps you're tempted to take... Read More

reliable maid service Winnetka ..