Shaun Stanislaus’s Tech blog

Just another weblog


August 23, 2009 Posted by | Uncategorized | Leave a comment

5 reasons you should use Joomla instead of WordPress

Joomla 5 reasons you should use Joomla instead of WordPresswordpress logoSince the SXSW showdown in March of 2009, it seems the beat of the fans drums of Joomla, WordPress and Drupal has been getting louder. I don’t know if its my imagination, but I have seen more and more blog posts about comparing thee three great open sourceplatforms.

Or maybe bloggers know people are searching and just want to get traffic for joomla vs wordpress vs drupal

Anyway, I digress…

A while back I did a post How to choose between Joomla, WordPress and Drupal that got a lot of interest, but it wasn’t too serious, and really, I ducked the question.

So here goes…

5 reasons you should use joomla instead of WordPress

Wait… before I start, I should say, yes, I do have a blog. A WordPress blog in fact, that I post diatribes about being a parent of 3 young boys. I like WordPress, its easy to use, and looks great for a blog (Joomla… did you note the comment about easy to use?)

1. You need more than a blog

WordPress fans will poke you in the eye and kick you in the shins if you say it, but WordPress is a blogging platform. There is a reason 800 (or some crazy number) blogs are started every day at Its really easy to set up a good looking blog out of the box and start blogging.

Joomla turns that on its head. Joomla is a CONTENT management system. Sure, you can use it for read more-type articles (that’s a blog), but it will manage your PDF’s, videos, images. Whatever web content you need to organize.

2. More diverse extensions

If you look at the number of 3rd party extensions available for WordPress and Joomla, there is a similar number, about 4000 or so. I am going to suggest though, that the selection in the Joomla-verse is a lot wider. Shopping carts, yes we have that. Directories? Tickets systems? Yes, got you covered. We even take care of your lacrosse league or woman’s menstrual cycle needs (though probably not at the same time)

3. More powerful

Another area where the WordPress fans will start waving that pointed stick at you is to start talking about power. They’ll say that WordPress is more than a blogging platform, its now a fully grown CMS.

I still can’t see this to be the case. Looking across the landscape and you’ll see Fortune 500’s, huge NGO’s, government organizations and big community sites using Joomla.

I have yet to stumble across a company that’s listed on the NYSE that’s running its corporate website on WordPress.

4. More sophisticated templating

My day job is running a company that makes Joomla templates. I wrote the original how to on templating for Joomla. I think I speak from a bit of authority here when I say that templating with Joomla is very very powerful.

When it comes down to it, WordPress and Joomla are a bunch of pseudo php includes to squirt database content into your webpage, but Joomla’s is so much more powerful. This ain’t your momma’s blog.

5. Its easier to customize

This is somewhat of a catch all reason, but its important to realize how much more diverse Joomla webistes can be. Its a combination of the diverse extensions/plugins, the templating and the power. When you look at the SXSW CMS smackdown, there is a big elephant in the middle of the room.

All three platforms achieved sites that looked and functioned virtually identical. But the Joomla entry had took 63% of the time to complete than WordPress (72% of Drupal), and 2%, yes 2%, of the amount of custom code needed.

6. Its not Drupal

(ok.. that was a 6th)*

Yes, this article is pure link bait. Please do the decent thing and link to it appropriately using the words, Joomla, WordPress and/or Drupal.

*I think Drupal is great. I’d probably like it more than Joomla. Unfortunately, I don’t know much PHP so I’ll have to stick with Joomla**

**Yes, that was also linkbait

August 5, 2009 Posted by | Joomla, Uncategorized | , , | Leave a comment

Twitter tools | Great for now, but will they last forever?

In the broad social networking space, Twitter is unique in that there are a large number of free applications available. IT pro Shaun Stanislaus shares some thoughts on this broad area of accompanying tools for the service.

Recently, I mentioned that I am a fan of Twitter. One of the nice things about Twitter is that there are so many applications to allow you to post or tweet compared to other social networking sites. It is easy to tell how someone tweets, from your homepage you can see when and how a person has made their tweets. Figure A below shows my tweet about writing this very blog:

Figure A

This shows that I used the Twitter Opera widget to make the tweet as an add-on to the Opera browser for my Twitter feed. Looking closely at Twitter there is a wide distribution of tools people use to tweet. This is primarily because the Twitter API is very straightforward and well documented for application developers to follow.

But, there are so many tools out there. Here are a few of the popular Twitter applications and Web sites:

Trillian: A powerful all-in-one applet for many social networking services.

Bit.Ly: A nice follow-up from a URL shortening service.

Tweetie: “The Mac people love it”

Tweetdeck: Another social network consolidation application.

Twhirl: Multiple service consolidation, URL shortening, image posting with pictures.

Twitterfeed: A blog to Twitter application.

Twitterfon: iPhone and iPod Twitter application.

Twittelator: Another iPhone Twitter client. A multi-service consolidation client.

Twitterfox: A Firefox extension for the popular browser.

Twitterrific: Mac and iPhone Twitter application.

Ubertwitter: Mobile device Twitter client.

Seesmic: Twitter and Facebook client.

Tweed: Palm-based Twitter client.

Twaitter: A time-delayed Twitter posting application.

Twinbox: An Outlook-based Twitter client.

TwitterBerry: A BlackBerry-based Twitter client.

And that is just a quick look at what people are using to post. Of course you can go fully old-school and post via the web browser.

With all these tools out there, a number of points need to be made. Above all else, all of the Twitter tools won’t be around forever. Some of these organizations will fail or the Twitter API will be updated and the applications won’t support it without further development. The other important thing to consider is the source of these tools. This goes for any community-developed or open source application. Simply think about what you are using for your Twitter stream (or any other social networking service) and the origin of the software. Further, if you are running some sort of business off a Twitter application – make sure you can move everything you do to another application if needed.

July 28, 2009 Posted by | Uncategorized | , , , , , , , | Leave a comment

Top 13 Twitter Don’ts

The number of new Twitter users has soared over the past few months, as the microblogging service has taken the media by storm. If you’re one of those new users, you may be baffled by Twitter’s peculiar culture, or nervous that you’ll commit some kind of microblogging faux pas.

Don’t worry, we’re here to help. While there aren’t specific rules for how to use Twitter, avoiding these 13 Don’ts will help you fit right in—and may even gain you some adoring new followers.1. Don’t live-tweet TV shows. @CorinneIOZO warns that lots of people use DVRs or watch shows on Hulu these days, so spoiling big moments (“OMG, the smoke monster was actually from outer space! No way!”) is a major no-no. As an alternative, tweet an inside joke that the show’s viewers will get, but that doesn’t give away any important details.

2. Don’t say anything that could get you fired or prevent you from getting a job. @JoelSD points out that if your tweets are public, they really are open to everyone, as has been demonstrated time and time again.

3. Don’t be boring. A simple rule that @kmonson follows is “Never tweet about food or the weather.” If your friends see one more “Good morning Twitterverse!” or “I had some awesome corn flakes for breakfast,” you’re getting un-followed.

4. Don’t forget the Twitter lingo: RT is retweet, and @name is how you respond or give props to someone. Feel free to be generous with both your RTs and your @s.

5. Don’t tweet more than ten times a day, or more than five times an hour, says @JasonCross00. It gets annoying and takes space and attention away from other Twitterers’ links and observations. If you have that much to say, maybe it belongs on a blog.

6. Don’t reply to every single tweet. As @seanludwig points out, it gets old fast.

7. Don’t tweet drunk, cautions @whitneyarner. Just like in real life, your followers might get a kick out of your drunk tweets, but you’ll probably regret them in the morning.

8. Don’t tell us about something cool or life-changing without a link or picture (use a service like TwitPic for your photos, and a URL shortener like TinyURL or for your links).

9. Don’t retweet something and leave off the original Twitter poster. Always give credit to those who wrote it first.

10. Don’t ignore people who send you a direct message or a reply, says @LanceUlanoff. Part of the Twitter experience involves conversing with your followers when possible.

11. Don’t #hashtag every topic. After a while, your topics will be ignored.

12. Don’t whine about people not following you, pleads @SaschaSegan. If you’re good at providing interesting stuff and you’re patient, you’ll get the followers you crave so badly.

13. Don’t tweet your bathroom habits. Seriously. Just don’t do it.

April 20, 2009 Posted by | Uncategorized | , | 13 Comments

Top 10 Information Security Skills

On a roll with my top 10 lists and as always if you see a skill that is not represented here that should be in this list feel free to comment. In reading through IT Toolbox all of us bloggers and wiki writers have great ideas and theories. The other writers are well worth reading for their humor and their stories, you can identify with them because they are our stories as well. We have all been there, we have been on both sides of the hiring table, and in our shops, and on our watch floors, data centers, help desks, and other places where IT workers seem to congregate. Moreover, yes, we have even been in the hallway with our coffee and doughnuts talking about the day and what it will bring. We have our skills, we were hired for a reason, and if someone interviews with me, these are the top 10 information security skills I am going to look for.

1. Communicate – I think that this is the most important information security skill, without being able to communicate it is hard to move ahead anywhere. Even if you have the best ideas in the world, if you cannot communicate them, no one will ever know.

2. Application Penetration Skills – being able to despin and understand how applications work, what protocols they use to communicate, what information is input and output from those applications, and best of all, how to make those applications do things that the programmer did not intend the application to do. This is the next major battle front in information security, and being able to move effectively in this space is important for future job success

3. Network Penetration Skills – being able to understand and use network properties like ARP, ICMP and TCP/IP to map, understand, and find vulnerable nodes on the network is a core skill.

4. Knowing what is a viable attack and what is not – tools that we use often spit out false positives, IDS systems, IPS systems, even our network and application penetration test tools all spit out false positives. Knowing which attacks against what target are viable and then being able to prove that viability to the developers and users of the system is a core skill.

5. Knowing how data migrates around the network – how is data used, where is it used, and who uses it in normal day to day patterns allows the Information security person to know when data is being misused, or someone who should not have access is trying to get access to it.

6. Network engineering skills – just enough to know how each component works on the network, what its function is, what its strengths and weaknesses are, and how it can be exploited.

7. IDS/IPS interpretation of results – being able to work with the IDS/IPS that is on the network and knowing how to find out more information about the data presented is a core skill. There is no sense in spinning up the whole department for a false positive, know how that IDS/IPS works, and what its limitations are.

8. System Administration – know enough about system administration that if presented with a series of computers, you can safely secure them allowing the applications to run that need to be on the box.

9. Risk Management skills – being able to understand the concepts of risk management, and how they are applied in regards to the companies culture. Not all companies are the same when it comes to risk management; each company has their own tolerance to risk. Be able to work within the confines of the companies tolerance for risk

10. Be creative – of all the top 10 skills that I am looking for, the ability to be creative when doing work makes the employee much more flexible, and easier to go forth and do good things.

I am sure that people will point out that I did not include in this firewall management, or certificates like the CISSP or GIAC. Nor did I mention education like Bachelors, Masters or Doctorates in this list. And that would be correct, because I am looking at hard skills, things that people know and when the rubber meets the road, I know that they can perform a task. CISSP and even formal education are more for the HR department and the companies screening processes. This top 10 list looks at core skills and core processes where if the person has even ½ of this list down cold, I know that they can do good work, and that I do not need to worry about them unless they cannot communicate.

I also did not focus on specific applications, like RDBMS systems, or CRM, nor did I focus on specific tools, as the information security person will always have their own tool box that they bring along with them. Ok, big paintbrush there, not all information security people have their own toolboxes, but they should. I was looking at the core skills, the absolute things that any information security person should honestly know. In line with my “if you find them hire them” note. If you find people with these core skills, you need to hire them.

The opinions of this article are the opinions of this writer. They are not the opinions of my employers, nor in any way does this blog, these entries, or any information on this site reflect the opinion of my employers or people associated with me.

January 21, 2009 Posted by | Uncategorized | Leave a comment

10 Things You Should Never Write in an E-Mail or Instant Message

The following 10 phrases draw more attention to your surreptitious e-mail activity than they do to conceal it, and though they seem harmless, they could put your job and career in jeopardy, especially during this recession.

We’ve all done it: Dashed off an e-mail or instant message in which we shared with a co-worker confidential information about a layoff or bad quarter, trash-talked a boss or squawked about a hair-harebrained management decision.

Knowing we were typing something that we should have kept to ourselves, some of us might qualify our e-mail or IM with one of the following 10 statements, to underscore the sensitivity of the message and to cover our butts:

1. “I could get into trouble for telling you this, but…”
2. “Delete this e-mail immediately.”
3. “I really shouldn’t put this in writing.”
4. “Don’t tell So-and-So.” Or, “Don’t send this to So-and-So.”
5. “She/He/They will never find out.”
6. “We’re going to do this differently than normal.”
7. “I don’t think I am supposed to know this, but…”
8. “I don’t want to discuss this in e-mail. Please give me a call.”
9. “Don’t ask. You don’t want to know.”
10. “Is this actually legal?”

However, such efforts to circumscribe the sloppy e-mails and IMs we send are misguided, says Elizabeth Charnock, CEO of Cataphora, a provider of e-discovery software. In fact, the phrases listed above draw more attention to us and our surreptitious e-mail activity than they do to conceal it or to protect us, she says, because those are the very phrases investigators, compliance officers, lawyers and HR staffs use to identify bad corporate behavior. (Charnock developed the list of 10 things you should never write in an e-mail or IM, above, based on e-mails and documents her company has analyzed for clients.)

“Everybody uses e-mail in ways that are sloppy because it’s so easy and convenient,” says Charnock. “But it can cause trouble. Writing ‘Delete this e-mail immediately’ is a marker for some content that by your own definition shouldn’t be there.”

What kind of trouble can these statements get you into? Big trouble: You could get fired if your employer finds out you’ve shared confidential information over e-mail or IM, says Charnock. Even if you’ve just used your e-mail to share what you think is a funny forward or to let off some steam about a manager or co-worker, you could get canned for that too, adds Charnock, especially if someone else has filed a sexual harassment or hostile work environment claim against you. Then, that “funny” e-mail you sent or the e-mail in which you let off some steam could be used as evidence against you.

In 2004, for example, PNC bank fired two women for forwarding seemingly innocuous joke e-mails over their company’s network.

“Most people think, ‘I’m not breaking laws. I’m not committing fraud or stealing from the company. I’m just doing what normal employees do, just bitching and moaning,'” says Charnock. “But if the compliance guy brings your manager into it, you can get fired right there.”

If an e-mail you send gets flagged by your company’s e-mail monitoring software, that might give your employer more reason to snoop through your virtual paper trail, says Charnock. “If a cop wants to follow you long enough, he’ll find a reason to give you a ticket,” she says.

And in the event your e-mails serve as evidence of criminal wrongdoing, well, then you can be brought up on criminal charges too, adds Charnock.

She expects that more companies will search through employees’ e-mail to help them decide who to keep and who to lay off during this recession.*

The moral of this story is not to avoid using the red flag phrases investigators use to identify suspicious e-mails and IMs; it’s to avoid sending those questionable messages in the first place. If you’re about to write an e-mail where you’re thinking of adding, “I shouldn’t put this in writing,” or “Delete this as soon as you read it,” you shouldn’t be sending that e-mail, says Charnock.

It’s just not worth risking your job, especially in this economy.

December 15, 2008 Posted by | Uncategorized | , | 1 Comment

My True Horoscope characterise, SO TRUE.

fun quiz for myspace profile and blog

Lets101 – Free Online Dating

December 13, 2008 Posted by | Uncategorized | | Leave a comment

Side effects of Lauracraft Game

November 5, 2008 Posted by | Uncategorized | Leave a comment

Is this the starting?

Corporate brands look to young developers

SINGAPORE–To ensure they continue to provide services that are relevant to market conditions, some companies are looking beyond their in-house IT departments to get fresh new ideas.

Jowena Liang, senior vice president and head of consumer marketing and Internet banking, Singapore, at DBS’ consumer banking group, said: “Usually the people who use mobile applications are young people. Sometimes, when you’re too close to the business, you’re hampered by barriers like budget constraints and mental blocks.”

To tap the ideas of young developers in engaging the mobile audience, four corporate sponsors have joined Yahoo to support its recent mobile developer competition.

The competition, announced about a month ago, was extended to students from six Singaporean tertiary institutes, and called for widgets to be developed on Yahoo’s mobile app platform, specific to what the sponsors–DBS Bank, Kellogg Asia, Malaysia Airlines and–were asking for.

read more..

October 27, 2008 Posted by | Uncategorized | Leave a comment

Summary of October

Okay, i know it is 4 more days away till the end of the month.

BUT anyway i will just blog first.

Okay here we go

Summary of Events

VMware Virtualization Forum 2008, 16 October ’08

VMware delegate

VMware delegate



Buddy Herald flew off to Air Force School in Sydney, 18 October

SIM Pageant @ Zouk, 24 October

end of work with Sybase

Sybase namecard

Sybase namecard

Had a couple of Mnc Companies offering me from i would not want to include I think they should work more on how the other job recruiting web agencies interface works and how they keep job seekers inform.

One of the companies that offered me was Barclays. I am looking forward to  work in a bank environment  and i would most likely be able to apply  the industry best practise there if i am given an opportunity.

And my frank opinion about Sybase, they have poor physical security, anyone can just walk in and do a social engineering at the helpdesk and GUESS WHAT? They do have a bio-metric Door access Card issued to every employee BUT some employee are lazy to slide the card and key their pin in, so they usually stare at the Front Desk Lady to press the door button for them.

And having such event like this, would be easily infiltrated by someone who wishes to do a social engineering or rather profiling of company’s information by walking in and perform dumpster diving, plugging in to their network and fingerprint their network, indentity theft, talking about Art of Manipulation inlcudes the acquistion of sensitive information or inappropriate access privileges by an outsider, based on the building of inappropriate trust relationships, this ability to blend in is seriously a threat to the organisation, which i think they should look into it and do something about it. What i have concluded is that the people at sybase do not social much within the department and i could feel some sort of racist atmosphere over at sybase as compared to Sybase 365, i can say that at Sybase 365, the people there are much friendly and easily approachable and lastly they both have a relax enivornment pantry and yes i did enjoy myself over at sybase serving important delegate and sharing with them on the insights Security, and it was a pleasure to meet legendary John Chen CEO of Sybase, who was a student of Brown University. I admire how he build Sybase up. He was here for the CEO submit 2008, another person is Marty J, Beard CEO of Sybase 365.

and yes, i will talk about Industry best practise in the next post and asia’s tech news.  read next post.

October 27, 2008 Posted by | Uncategorized | Leave a comment