Becoming an expert at HackHands

Recently, I applied for one of those student packs GitHub offers. I found it purely random but I couldn’t be happier about it when they approved my request (It took less than one hour!).
For those who don’t know what this is about, it consists in a serie of software for helping students by providing them some tools to learn by doing. It seems they know, certain tools use to be quite expensive.

Anyway, out of that list I found one cool service called HackHands. They connect users experiencing different kind of issues with experts on the field they’re requesting assistance. Well, with this GitHub Pack, you receive 25 dollars for using on their website to request assistance. This is, to be honest, a quite weak time: 25 minutes of assistance.

Also to be fair, the platform itself is quite good. They instantly provide a bidirectional code editor, chat, share monitor, and video conference that simply work.

The point is that I applied for becoming an expert, and they accepted my request too within one day and a half or something like that. They requested me to prove my experience and now I’m solving some open requests on there. However I can be directly booked using my Hackhands profile.

Responsibilities of 2015

It’s been a long time since I first realized that having technology right on our fingers is a quite powerful tool thing that we should use for something good. I ain’t gonna say exactly for doing what or what not, since everyone has their own interests. However, at some point our interests limits with our privacy. Until what exactly point you would share the things you search, receive or save in your different accounts? In this article I’m just gonna try to throw out all my thoughts and opinions about what I consider responsibilities implicit when we use 2015 services.

Internet, as you may probably know, is a bast, huge network of connected computers. The way they are connected differ a lot from ones to others and therefore, the way to access the information that resides inside’em varies too.

Not everyone is gonna be your friend.

The first thing you should take in consideration is that it’s not only about you and your friends those who make internet. May sound obvious, but the majority of internet users I know, miss the point that there are hundred, thousands of people out there that have set up computers to go attack others computers that may contain your private information. Said this, I’m assuming in the following examples, the worst possible scenario.

Protect yourself before being connected.

You’re at the office, go out of your desk for a break and you leave your computer unlocked. What is then the meaning of the password one IT guy have set for you? Ok, most probably nothing will happen the 90% of your breaks, but what about that precise day one of your envy mate tries to get some info on it.

There are tons of examples like this one. A USB bag becomes useless if its passcode is your birthday date. All your info get revealed when you go to the toilet and leave your non-secured phone on the table with tons of friend. Who did not suffer the joke of a friend that updated our Facebook status with something ridiculous after login in his/her computer?

Anyone can attempt to access your accounts whilst you poo.

Pretty self explanatory, though. Your password strongness measures how easeful you can be during that moment. Try to avoid common passwords, share them between accounts. A good practice would be to memorize a random generated password for at least your most important services like email, social networks etcetera, and to use two or three different ones for less important accounts like forums.

Mind the gap, and mind your fingerprints.

I bet you wouldn’t expose your 800€ iPhone at the top of a skyscraper window, may be unsafe. Well, login in certain places, computers or networks may expose your sensitive data. Although it is not a common issue for mid-internet users, remember it is also a 2015 responsability, to check an have certain control over who you are in internet. The companies are checking our profiles, articles, opinions, and so son on the network of networks probably right after read up our CV applying for a vacancy and, based on my experience, this last part may have more weight than the CV itself.

2015 is almost here and it’d be great to follow some considerations and cautions whilst using technology from here onwards. It is on our pockets, livingrooms, bed-tables, wrists… checking and collecting every movement, sound or gesture we do. Try to do your best for keeping your second being as safe and sound as yourself.

Bash recipes for creating and removing MySQL users and databases

You know the process. You studied it sometime before, but you never remember the exactly commands and that fussy MySQL syntax for doing something as simple as creating a database, user and grant the permissions to it.

So I created two recipes for bash that you can execute directly from your server or, like in my case, use them by including the code on the right section in forge. Then, the only thing left to do every time you want to create something, is to replace some variables and wait the email confirming the execution and your database details. Continue reading Bash recipes for creating and removing MySQL users and databases

Custom tabs with TinyMCE editor on WooCommerce products

Yo! WooCoommerce is a quite big, flexible but simple and clear e-commerce platform. At my office, we’re starting to offer e-commerce solutions based on the WooThemes platform. However, every single client requires specific features. In today’s problem, we wanted to add custom fields on our product edit page.

Continue reading Custom tabs with TinyMCE editor on WooCommerce products

Installing October CMS on 1&1 shared hosting

October has appeared a few months ago as a framework that aims to make the web development process simple again. This phrase sounds really good, however it seems like only the install process is really complicated under certain shared hostings and the support for this type of scenarios is not that good.

In this small article I’m trying to reproduce the errors I’ve found and a possible solution if finally I managed to find it. (I did! Check the bottom of there article)

Automatic installer?

October provides an installation wizard to complete the initial setup easily. At least that’s what they pretend but, in this case, when we try to run this installer the only thing what appears is a really uniform white screen. Not even an error. I submitted this issue on their official GitHub issues page, but after 3 months open, I lost my faith on any reply or fix for it.

I’ve checked manually all the requirements they ask for. Here the list updated by 31st August 2014. All of them are available except ZIPArchive.

  • PHP 5.4 or higher with safe_mode restrictions disabled (Passed)
  • PDO PHP Extension (Installed)
  • cURL PHP Extension (Installed)
  • MCrypt PHP Extension (Installed)
  • ZipArchive PHP Library (Missing)
  • GD PHP Library (Installed)

As you can see, only the ZipArchive library is left, but it doesn’t work neither. I don’t know why nor how to solve or start to investigate it.

I’ll try to update this post if I can throw some light on this darkness, but i would love to hear from you if you have any update about this.


By the moment of writing this article I wasn’t able to find a solution for the problems that appeared. Nevertheless, there was a good discovering today at the 1and1 servers. They recently installed PHP-CLI, what finally is turning easier to use some apps like Laravel.

Update October 7th 2014

By today I found the problem! If you want to know more about what was happening you won’t beleive. The only problem was unzip process in 1&1. The unzip command there uncompressed the installer classes lowercased so PHP was and was not able at the same time to find those files. If the files had a completely different name, it’d throw an exception at least.