The name of this module is slightly misleading. It allows you to view the recent contributions of a user to the site.
One particular use for it, is that if one user found a particular user’s posts interesting (perhaps, they both owned troublesome T-Rexes!), they could view the user’s track page, and look for other contributions from that user which they might be interested in. This is only one way of interaction though, as opposed to two users interacting with each other.
Within User management, we have three areas that we are yet to cover. They are:
Let’s look at these now.
With the access rules, we can explicitly permit or prohibit certain usernames, email addresses, or hosts (computers) from accessing or joining our social networking site.
There are quite a few different reasons why we may wish to do this. Let’s take a look at a few specific examples:
To block an entire email domain such as pookmail.com or hotmail.com, we would create two rules, both with Deny as the access type and E-Mail as the Rule type, and then %@ followed by their respective domain names. The % character tells the rule to match anything that comes before the @ symbol
If we want to block all hotmail.com e-mail addresses except our friend’s, our.friend@hotmail.com, then we would create an allow rule for this account.
Creating rules with Username as the Rule type and the swear word (with a % on either side) will prevent such usernames from being registered.
The Check rules link at the top of the access rules page, allows us to check these rules by entering a username, email address, or hostname to see if that would be permitted or prohibited on our site.
Be careful!
If you add certain “bad words” with the wildcard (%) character on both sides, you can prevent some genuine signups; so this should be used only for extreme words.
From here, we can configure the registration requirements of our users, email templates used for new accounts and so on, and users’ picture settings.
We can determine what security precautions should be taken when a new account is registered. New accounts:
Requiring email verification is a good idea. It is the very first and most basic method to help prevent spam and abusive user accounts. The User registration guidelines box can be used to provide some help for our users, and perhaps a link to some legal terms and conditions to help protect ourselves from liability.
Users will often receive an email from our site automatically when:
The User e-mail settings area allows us to change the contents of these emails.
Click on Administer | User management | User settings | User e-mail settings further down the page.
Selecting an email allows us to change the template. Within these templates, there are tokens that are replaced with specific information when they are sent, for example, the user’s username or a specific link. So it is important to ensure that these are still in the template. These variables are clearly defined when editing the template. They are all listed under the template name, each of them starting with an explanation mark, for example. !username for the username, !login_uri for the link to the log in page.
I remember deciding to pursue my first IT certification, the CompTIA A+. I had signed…
Key takeaways The transformer architecture has proved to be revolutionary in outperforming the classical RNN…
Once we learn how to deploy an Ubuntu server, how to manage users, and how…
Key-takeaways: Clean code isn’t just a nice thing to have or a luxury in software projects; it's a necessity. If we…
While developing a web application, or setting dynamic pages and meta tags we need to deal with…
Software architecture is one of the most discussed topics in the software industry today, and…