Hacking Movable Type
Movable Type, that amazingly powerful personal publishing application, is the superhero of the Internet age. But when you push, poke, stretch, and otherwise coax it into producing even more, the possibilities for your Web content are simply superlative. Roll up your sleeves and get moving-here's the first book to tell you how.
Discover how to do all this and more
* Hack the perfect installation
* Hack the database
* Play with Atom, Perl, and XML-RPC APIs
* Write advanced plug-ins
* Master dynamic publishing
* Hack a super-powered blog app
* Ban comment spam
* Build customized templates
Brad Choate has been hacking Movable Type since it was first released. He is now a Six Apart software engineer where he hacks Movable Type for a living, supporting his incredibly understanding wife and three little hackers.
Ben Hammersley is an English journalist and writer, and has been using Movable Type since version 1. He lives in Florence, Italy, with his beautiful wife and three greyhounds and is currently tending his cigar and dressing gown habit with little success. He invites you to visit.
Matthew Haughey is closing in on ten years of building websites and runs the popular MetaFilter weblog as well as half a dozen smaller weblog projects. He’s been tinkering with Movable Type since the very first private alpha that his friends, Ben and Mena Trott, let him test out. He’s been hacking away at it ever since.
David Raynes got his first taste of blogs in the first half of 2002, and was running his own by summer’s end that same year. Shortly after, his first plugin, MTSearches, was released, and the rest is history. One of his most popular plugins, SubCategories, was even integrated into Movable Type as of version 3.1. David works as a software engineer in Maryland, where he lives with his wife, Jenn, and their four cats (two his and two hers): Hans, Franz, Tim, and Gizmo. Eventually the feud between Tim and Franz will be resolved and there shall be only three.
Table of Contents
Part I: Hacking the Perfect Installation.
Chapter 1: Preparing Your Installation.
Chapter 2: Tweaking the Templates.
Part II: Hacking the Database.
Chapter 3: MT and Database Storage.
Chapter 4: Tables in the MT Database.
Chapter 5: Absolutely Necessary Database Tricks.
Part III: Hacking with APIs.
Chapter 6: XML-RPC API.
Chapter 7: Atom API.
Chapter 8: Perl API.
Part IV: Hacking with Plugins.
Chapter 9: The Wonderful World of Plugins.
Chapter 10:Writing Plugins.
Chapter 11: Advanced Plugin Writing.
Chapter 12: Hacking Dynamic Publishing.
Part V: Hacking Powerful Blog Applications Together.
Chapter 13: Photo Blogs.
Chapter 14: Linklogs.
Chapter 15: Blogroll.
Chapter 16: Events, Reminders,To-Dos.
Chapter 17: Polls.
Chapter 18: LazyWeb.
Chapter 19: Creating a Community-Authored Website.
Sign up now »
- FTWeb Developer- Drupal and PHP. Exciting new position- #2 in Dev team.$100k+SuperNSW
- FTSenior Python DeveloperNSW
- FTR&D EngineerSA
- FTSenior Python DeveloperNSW
- FTLead Software EngineerSA
- FTSenior Python Web Applications DeveloperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTQuality ManagerSA
- FTOS Web Applications DeveloperNSW
This report covers the frequently asked questions associated with the implications of BYOD devices in the workplace. Any solution in this space needs to be built on simplicity, scalability and ...
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
"Too little too late. Spice normally has better standards than this. I ..."
Spiceworks' free management software gets integrated MDM
- Opinion varies on action against Chinese cyberattacks
- Chinese hackers resume attacks on U.S. targets
- Govt asks industry for help to stem security breaches
- Peculiar malware trail raises questions about security firm in India
- Attack on Telenor was part of large cyberespionage operation with Indian origins: report