get_col("DESC $table_name", 0) as $column ) { if ($debug) echo("checking $column == $column_name
"); if ($column == $column_name) { return true; } } //didn't find it try to create it. $q = $wpdb->query($create_ddl); // we cannot directly tell that whether this succeeded! foreach ($wpdb->get_col("DESC $table_name", 0) as $column ) { if ($column == $column_name) { return true; } } return false; } } function btc_altertable() { global $tablecomments; $sql = "ALTER TABLE $tablecomments ADD COLUMN comment_reply_ID INT NOT NULL DEFAULT 0;"; maybe_add_column($tablecomments, 'comment_reply_ID', $sql); } function btc_alter_comment($new_id) { global $tablecomments, $wpdb; $sql = "UPDATE $tablecomments SET comment_reply_ID=".$_POST['comment_reply_ID']." WHERE comment_ID = $new_id;"; $wpdb->query($sql); } function briansnestedcomments() { global $font_gets_smaller; if (!($withcomments) && ($single)) return; // You can safely delete the single line below if your threaded comments are up and running btc_altertable(); ?> Usable Security » 2005» March

Archive for March, 2005

The Path of Least Resistance

Thursday, March 17th, 2005

This year I attended South by Southwest for the first time and enjoyed meeting lots of interesting folks.  During a session about decentralized social networks, the panelists mentioned the problem that bloggers (especially beginning bloggers) sometimes post personal information about themselves in public without realizing the risks.  Often they may be unaware of [...]

Look Beyond the “Fundamental Conflict”

Saturday, March 12th, 2005

What better way to initiate a usability blog than by picking a bone with a prominent figure like Jakob Nielsen?
In one of his Alertbox columns, Nielsen opens the discussion by outlining a “fundamental conflict” between usability and security.  He writes:
Usability advocates favor making it easy to use a system, ideally requiring no special access [...]


Saturday, March 12th, 2005

Welcome to this blog.  Though there’s a lot of good writing out there about usability and security as separate topics, the intersection of the two is only just beginning to gather interest.  The communities of researchers and practitioners in both fields need to start talking to each other.  I couldn’t find any [...]