It is a happy new year indeed with the release of XOOPS 2 to a select beta team. Please understand that due to overwhelming demand and limited support resources, we have limited the beta team to a select group for now and cannot accept any more requests. Please understand that this approach is necessary to help our core dev team stay on track.
As soon as the beta team has finished testing the product, there will be an announcement with a date set for the official release so, please stay tuned.
Just finished off my latest Xoops site. It is called Blackburn Life and uses the Xoops portal. You can see it at http://www.blackburnlife.com It's for pubbing and clubbing in and around Blackburn in Lancashire. The website uses a heavily modified EADJ lite 2003 theme - which is great!
As of the New Year ModsCentral is now a Xoops Only Site!!
Due to a bit of confusion [size=x-small](and a few other things)[/size] with the two *Xoops CMS’s being together at ModsCentral, I have decided to make the split and have total support for Xoops only at ModsCentral.
As a recent Mac convert like many others out there coming from the Windows world, we often have trouble finding the right server software that was so easy to find for Windows or Linux. I ran across a site today that many of you may or may not know of called Aaronfaby.com. Prior to finding this site, I had to compile most things by hand for PHP and modules.
The guy from this site has take the time to create pre-compiled binaries for many Windows/Linux equivilent server software including Apache2, PHP 4.30, Perl 5.8, Postgres SQL, MySQL, etc... Have fun and a happy new year!
I have been using Postnuke for my CMS needs for some time. Untill recently i switched to XOOPS, and it does the job just nice! My site helges.net is my personal homepage, beefed up with lot of the modules i found. I adapted it all to fit perfectly, and im really satisfied now!
SecurityTracker Alert ID: 1005863 CVE Reference: GENERIC-MAP-NOMATCH (Links to External Site) Date: Dec 27 2002
Impact: Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): after 4.1.2 and before 4.3.0
Description: A buffer overflow vulnerability was reported in PHP. A remote user could cause the web service to crash or possibly execute arbitrary code.