Posted
about 15 years
ago
We will be moving servers over the next day or so, so you may see some interruption to the site.We hope to have everything back up and running as soon as possible.DM
|
Posted
over 15 years
ago
This week is Mozilla service week, a week where open source contributors and users are encouraged to put a little back into the community by donating time to carry out tasks to help others,The idea...
|
Posted
over 15 years
ago
Been busy working on other projects for the past few months, so DMCMS has been on hold. Decided that I would remove the forums here and just run with the mailing list. If anyone needs support, they...
|
Posted
over 15 years
ago
Getting DMCMS finished off for the version 1 release is turning out to be a good exercise. One thing has led to another and I now seem to be rewriting quite a lot of the code. What initially starte...
|
Posted
over 15 years
ago
For those eargerly awaiting the release of version 1, fear not, the wait is nearly over.We are integrating a few of the changes from the 080 (Pro) release into version 1. These are not feature chan...
|
Posted
over 15 years
ago
I am happy to announce that Version 1 is only a few days away :)We still have a small amount of tidying up to do, a couple of minor bugs to address and some new templates to write and we will be of...
|
Posted
about 16 years
ago
At present I have decided to put development of DMCMS 0.8.0 on hold until further notice. i currently have too many projects that require attention and so have decided to stop working on the 0.8.0 ...
|
Posted
over 16 years
ago
Unfortunately I have decided to close the Wiki. Whilst the idea of a collaborative effort for documentation is great in theory, in practice it simply seems to attract spammers and people intent on ...
|
Posted
over 16 years
ago
Another security vulnerability has resulted in yet another release. This time the fix is to prevent a remote file injection technique being used to remotely gain access by including a remote file w...
|
Posted
over 16 years
ago
A recent security vulnerability allowed an attacker to retrieve the stored passwords using an SQL injection technique. The technique used a cleverly formed SQL statement to be run when injected by ...
|