If you aren’t sure whether you are using a WP-MU blog, then you aren’t. Trust me. If this warning applies to you, then you will know it.
For WP-MU administrators: You should not use this plugin. Your users could use it to place (potentially malicious) javascript into their blogs.
This plugin is PERFECTLY SAFE for non-WP-MU blogs, so ignore this message if you’re using regular wordpress (you probably are).
The options->alink_tap_linker_remote page will create a set of matching terms and URLs that gets stored as a list.
“alink_tap_linker_remote” is a serialized value as follows:
array(
‘keyword1’ => array(
‘name’ => the keyword
‘url’ => the original url
‘urles’ => the url that serve the content in spanish
‘licencia’ => 1, 0 if 1, we check if client’s ip is from Spain and use the urles as link
),
‘keyword2’ => array(
‘name’ => the keyword
‘url’ => the original url
‘urles’ => the url that serve the content in spanish
‘licencia’ => 1, 0 if 1, we check if client’s ip is from Spain and use the urles as link
),
)
Nothing for now
The basic structure of this plugin was cloned from the WordPress-Plugin-Boilerplate project.
This plugin supports the GitHub Updater plugin, so if you install that, this plugin becomes automatically updateable direct from GitHub. Any submission to WP.org repo will make this redundant.