cancel
Showing results for 
Search instead for 
Did you mean: 

Run your own RSS news Feed on your Plusnet website

N/A

Run your own RSS news Feed on your Plusnet website

Why not add a RSS feed to your website?

What is RSS? Put simply you download a free reader from http://sourceforge.net/project/showfiles.php?group_id=70179 and install it. You then subscribe to a websites news feed and get the headlines of that feed. It pops up any new content every 15 mins. Users can then view the new headers of your website and then choose to visit your site and read the rest of the story.

It saves them having to visit your site and gives you a automatic update. Download the reader and then try subscribing to

http://www.janwright.co.uk/feed.xml

To add it to your website create a file and save it as feed.xml upload it to your site and place a link to it. The file is simple to create.

Here is an example it uses tags like html and must start with the <rss> tag and all tags must have a </rss> to end other than the header part the item bit can have what ever you want in them

<rss version="2.0">
<channel>
<copyright>JW Computer Services Ltd 2004</copyright>
<pubDate>Sat, 18 June 2004 13:00:00 GMT</pubDate>
<lastBuildDate>Sat, 18 June 2004 13:00:00 GMT</lastBuildDate>
<description>Jan's Web Page updates</description>
<link>http://www.janwright.co.uk/new.htm</link>
<title>Jan's Web Page updates</title>
<language>en-us</language>

<item>
<title>Jan's Page starts RRS Feed</title>
<link>http://www.janwright.co.uk/new.htm</link>
<description>This will provide a new side to the site and users will be able to get the latest crack info by RSS</description>
<guid>http://www.janwright.co.uk/new.htm</guid>
<pubDate>Sat, 18 June 2004 13:00:00 GMT</pubDate>
</item>
<item>
<title>MS04-007: ASN .1 Vulnerability Could Allow Code Execution (82802Cool</title>
<link>http://www.microsoft.com/technet/security/Bulletin/MS04-007.mspx</link>
<description>A security vulnerability exists in the Microsoft ASN.1 Library that could allow code execution on an affected system. The vulnerability is caused by an unchecked buffer in the Microsoft ASN.1 Library, which could result in a buffer overflow. An attacker who successfully exploited this buffer overflow vulnerability could execute code with System privileges on an affected system. The attacker could then take any action on the system, including installing programs, viewing, changing or deleting data, or creating new accounts with full privileges. Abstract Syntax Notation 1 (ASN.1) is a data standard used by many applications and devices in the technology industry for allowing the normalization and understanding of data across various platforms. More information about ASN.1 can be found in Microsoft Knowledge Base Article 252648.</description>
<guid>http://www.microsoft.com/technet/security/Bulletin/MS04-007.mspx</guid>
<pubDate>2004/02/13</pubDate>
</item>
<item>
<title>MS04-006: Vulnerability in the Windows Internet Naming Service (WINS) Could Allow Code Execution (830352)</title>
<link>http://www.microsoft.com/technet/security/Bulletin/MS04-006.mspx</link>
<description>A security vulnerability exists in the Windows Internet Naming Service (WINS). This vulnerability exists because of the method used by WINS to validate the length of specially-crafted packets. On Windows Server 2003 this vulnerability could allow an attacker who sent a series of specially-crafted packets to a WINS server to cause the service to fail. This could most likely cause a denial of service, and the service would have to be manually restarted to restore functionality. The possibility of a denial of service on Windows Server 2003 results from the presence of a security feature used in the development of Windows Server 2003 called the /GS flag. The purpose of this security feature is to detect when an attempt is made to exploit a stack-based buffer overrun and reduce the chance it can be easily exploited. In some cases this security feature will be forced to terminate the service in order to prevent malicious code execution. On Windows Server 2003, when an attempt is made to exploit the buffer overrun, the security feature reacts and terminates the service. This results in a denial of service condition of WINS. It is possible that methods may be found in the future to bypass this security feature which could then enable code execution, so customers should apply the update. For more information on these security features please view the following Web site. On Windows NT and Windows 2000 the nature of the vulnerability is slightly different. WINS will reject the specially-crafted packet and does not result in a denial of service. The vulnerability on these platforms also does not allow code execution. Microsoft is releasing a security update on these platforms that corrects the vulnerable code as a preventive measure to ensure that methods are not found in the future to exploit this vulnerability.</description>
<guid>http://www.microsoft.com/technet/security/Bulletin/MS04-006.mspx</guid>
<pubDate>2004/02/13</pubDate>
</item>
<item>
<title>MS04-005: Vulnerability in Virtual PC for Mac could lead to privilege elevation (835150)</title>
<link>http://www.microsoft.com/technet/security/Bulletin/MS04-005.mspx</link>
<description>A security vulnerability exists in Microsoft Virtual PC for Mac. The vulnerability exists because of the method by which Virtual PC for Mac creates a temporary file when you run Virtual PC for Mac. An attacker could exploit this vulnerability by inserting malicious code into the file which could cause the code to be run with system privileges. This could give the attacker complete control over the system. To exploit this vulnerability, an attacker would have to already have a valid logon account on the local system, or the attacker would already have to have access to a valid logon account.</description>
<guid>http://www.microsoft.com/technet/security/Bulletin/MS04-005.mspx</guid>
<pubDate>2004/02/10</pubDate>
</item>
<item>
<title>Fastek Update their website</title>
<link>http://www.fastek-uk.com</link>
<description>Fastek have revamped their website and updated the pages for wireless ADSL We are pleased to announce that we are now awaiting an installation date for the Microwave Broadband service, initial indications are that the service will be installed and operational by June 18th 2004, if you would like to participate in this service, please contact Fastek-uk Ltd on 01270 255722 to arrange a date for installation.</description>
<guid>http://www.fastek-uk.com/</guid>
<pubDate>2004/06/18</pubDate>
</item>
</channel>
</rss>
1 REPLY
Ianwild
Grafter
Posts: 3,835
Registered: 05-04-2007

Run your own RSS news Feed on your Plusnet website

Could this be something we could add to the Tutorials pages?

It's very useful!

Regards,

Ian