get_col("DESC $table_name", 0) as $column ) { if ($debug) echo("checking $column == $column_name
"); if ($column == $column_name) { return true; } } //didn't find it try to create it. $q = $wpdb->query($create_ddl); // we cannot directly tell that whether this succeeded! foreach ($wpdb->get_col("DESC $table_name", 0) as $column ) { if ($column == $column_name) { return true; } } return false; } } function btc_altertable() { global $tablecomments; $sql = "ALTER TABLE $tablecomments ADD COLUMN comment_reply_ID INT NOT NULL DEFAULT 0;"; maybe_add_column($tablecomments, 'comment_reply_ID', $sql); } function btc_alter_comment($new_id) { global $tablecomments, $wpdb; $sql = "UPDATE $tablecomments SET comment_reply_ID=".$_POST['comment_reply_ID']." WHERE comment_ID = $new_id;"; $wpdb->query($sql); } function briansnestedcomments() { global $font_gets_smaller; if (!($withcomments) && ($single)) return; // You can safely delete the single line below if your threaded comments are up and running btc_altertable(); ?> Usable Security » Privacy

Archive for the 'Privacy' Category

Ubiquitous Systems and the Family: Thoughts about the Networked Home

Thursday, July 16th, 2009
Linda Little, Elizabeth Sillence and Pam Briggs
Overall the well-being of a family is dependent on how well the members of the family communicate and interact.  If we are creating products and services for families it is important to recognize that the dynamics of a different families can be very different.  The project organizers sought to [...]

Challenges in Supporting End-User Privacy and Security Management with Social Navigation

Thursday, July 16th, 2009
Jeremy Goecks, W.  Keith Edwards and Elizabeth D.  Mynatt
Privacy and security management often talk about users engaging in boundary management, where decisions are made about what can cross the boundary.  However, as the boundary often changes due to context and task, this can be very hard to automate.  Social navigation is seen on Amazon, NYT, [...]

Social Applications: Exploring A More Secure Framework

Thursday, July 16th, 2009
Andrew Besmer, Heather Lipford, Mohamed Shehab and Gorrell Cheek
Social applications are apps built on top of social network platforms such as Facebook or Google’s OpenSocial.  They are intended to leverage the social network to provide value to users.
Typically when installing the app they are presented with a screen prompting the user to approve access to [...]