What is an easy way to play amazon s3 audio files on your blog?

I did a little research, and if I am not misunderstanding what I read, this is what I found out for you on audio streamed from Amazon S3: you set up your audio as usual, but you put the whole url, complete with http:// as the source of the audio.

Robert Plank
In my research I found one paid and one not paid resource. The paid is Mike Stewart's software, S3 media player, you must become a member of his paid site or a plugin called micro audio for wordpres I like the last one, very small footprint, very flexible.

I wonder what Robert will say about that it could be an opening for him, maybe, for another great plugin. Robert?

I am going to test Jim Edwards audio presentation wizard, and report back to you as well. OK?

A Link

How did I remove the iframe the hackers put on my index pages

I am getting a lot of questions on how to remove the iframes that got hacked onto the index pages, whether index.php, index html, or default.html

It is actually relatively easy, and I'll show you two methods, one with using ftp and the other using your file manager that comes with cpanel.

Hold on... I have a coaching client coming... I'll be back later this afternoon to show you step-by-step with screen shots... check back this afternoon... sorry for the interruption... OK?

Sorry... I am back.

Life got suddenly very busy... my students are suddenly producing results... yaaay.

Anyway, here are two ways to recognize and remove the iframes from your index pages.

Method 1: ftp.

ftp into your your site's root level and sort your documents by date.

locate and remove iframe hack

you may notice that my index.php file was changed on September 5.

This is a blog, and you don't change the index file... ever. so this must have been the hackers' target.

Now, from the result you'll see that this wasn't a manual hacker, it was a little mindless robot sent out the wreak havoc...

locate and remove iframe hack
the above index.php file is the healthy file that comes with your wordpress blog installation. it starts with <?php and ends with ?>

that is how it should be.

locate and remove iframe hack

on the above index.php file, please observe the last line. after the closing ?> there is a whole line of code... that is the code you need to remove.

locate and remove iframe hack

this is how the whole line looks... Save and upload your file and you are done.

The second category of files that got hacked are files that have body tags in them...  they can be both php or html files. the commonality is that they contain a body tag, that looks like this <body>

Sometimes after the <body there is other code, and then it closes with a > tag. It is still a starting body tag.

locate and remove iframe hack

this is (above) how a healthy file looks with body tag

locate and remove iframe hack

this is (above) how an infected file looks with body tag

you need to delete the line that has the iframe tag <iframe src..to <iframe>.

Third important thing: folder or directory dates also change when files change inside. So if you have subdirectories that have a newer date, please check the index files inside... I found 202 infected files, because my sites have many subdirectories.

Good luck, and please let me know how you are making out.
Was this enough information? Please talk back to me.