WordPress Backups

Your host should provide automated daily, weekly and monthly backups of your site. Additionally we install a backup plugin called Updraft plus to allow you tak emmanuel backups of your WordPress that you can download an sleep safe. We recommend sending these manual...

ActionNetwork CSS

ActionNetwork Reference ActionNetwork’s CSS snippets for embed customization Using the right Embed Code This setting allows you to over-ride the ActionNetwork CSS using your theme CSS ActionNetwork signup Form As displayed on this page (right or bottom) /* Start...

Edit font sizes in Tutanota

Tutanota does not give much options for editing their interface. Here is a Chrome (and Brave) extension that allows you to tweek the fonts using CSS. The changes I have made are to reduce font size in the email listing (making it easier to scan email)  and to change...

Recommended WordPress Plugins and Themes

We believe in less is more and aim to reduce the number of plugins we use. This list is the best of the best. View our recommend free plugins on our profile on the WordPress repository Also check out the slow wordpress plugins  Themes Divi (paid) Plugins used on most...

WordPress Code Snippets

Template tags // // Display the terms that are associated with the post (or posttype) for a specific taxonomy (taxonomy-name)<code> <?php the_terms( $post->ID, 'taxonomy-name', '', ', ', '' ); ?> // or <?php...

Divi – horizontal sub menu

To create the submenu as in this screenshot: Dashboard > Appearance > menus > Create new menu > add menu items Dashboard > Appearance > widgets > Create new widget area Dashboard > Appearance > widgets > (reload page to load new widget...

Divi – How to add Divi icons to CSS

The snippet example will replace the bullets from a list with custom Divi icon (love heart). Go to the Divi Icon Code to get the code reference. <!-- HTML --> <ul class="ico love"> <li>Item 1</li> <li>Item 2</li>...

Client Engagement process

These systems are quite old and we are updating them. Client Engagement process 1. Client emails us via our website contact form Email Response (Autorespond) 2. We connect via Email/phone/zoom discussions Interactive website brief Standard Project Stages 3. Proposal...

Email Response

Hello {Your Name:1} Thanks for getting in touch, let’s get the ball rolling! Before we speak to you over the phone, here are some useful things to know: We charge by the hour. This is particularly good news if you are working on a smaller budget as we can give you...

Website brief

This resource is quite old (still under our old brand Dvize) and we only use this sometimes. We will update this soon Ask the right questions This is the document we use to ask questions of our clients to allow us to put together an effective brief. From this we can...

Project stages

A brief description of our old website development stages. We are updating these. Every project unique so we may approach your project differently, however here is our standard approach: Planning Workshop We go through your aims and goals of your website and overall...

Signing on letter

Hello, We are really looking forward to working with you to develop your new website. I have attached a few documents for you to read/action; Our legal agreement – Can you please read, sign digitally or scan and return the final page to me. Our deposit invoice. We are...

Sample Website Agreement

Cover your ass Version 4 – Released October 2020 This is the basic website agreement we use for delivering website services. We encourage our Clients to read and understand the agreement as it is designed to protect them as well as us. It explains what we and...

Our guide to project efficiency

How to save money on your project. We are obsessed with efficiencies. Inefficiencies can become the biggest cost to a project.   Project efficiency saves you time saves us time, therefor saves you money makes it easier to deal with complexity can teach you new...

Asana template

We are in the process of updating this We use Asana as it saves PM time and keeps a record of what is being completed or needs to be completed. For more information please see our guide to efficiency. The way we use Asana: One asana task per task. Add a new Asana task...

Project Handover

hello We got there. Your new website is live. YAY, WHOO HOO! The crowd cheers. We have moved the website to your new home and also completed these little tasks: Reset the email form with your email Adjusted the setting to allow Google to index the site Updated the...

Testimonial Please

Hello Thank you for working with ActionSkills. We really value our relationships and are hoping that you have been happy with our services on your new website. If you have been happy with our service, we would really appreciate if you could please write a short...

Security

WP software updates All software updated on Mondays using: managewp.com Malware scanner Use an external scanning service such as sitecheck.sucuri.net which uses external resources to scan the site review our list of security testing services Scanning a website is a...

DNS Name records

Subset of DNS Dynamic name serves control th edomain Name records control the parts of the domain Custom email (mx records) Registering email for spam filters Registering with google Redirecting sub-domains

Day 1 – Brisbane training – Dec16

Pre-Prep projector adapters name tags pens large paper snacks Setup Circle furniture Projector whiteboard scribe WiFi  details 9:15 Welcome Origine Respect Safer Spaces and Language Housekeeping Intro to Unite Intro me – Self-teaching – why training...

Introduction to media planning

Why plan? Gain the maximum exposure with your resources by planning your media systems. Make it easy for the media to cover your action. Supply free content that is valuable for their business models. When the mainstream media uses the content that you produce, it is...

Example media plan for a protest event

A  documented media plan allows more people to work on the media strategy. More people can also contribute to media as volunteers and find where their skills fit into the plan. Media planners are able to identify gaps in roles that will need to be shared or filled....

Example Online Supporter Page

We will be amplifying our action and launch by swarming as many people to post and share on social media within a short time period. Keep in contact with us for that time so you can help support and grow our swarm. We are asking for your help by: follow us on Facebook...

Media Checklist for Actions

Prepare your media systems and gear for your big day Credit: Leard Blockade. Also see the Counteract Media Checklist for Actions Day/Night Before the Action □ Identify media spokesperson – (ideally they should be involved in writing the media release) □ Identify...

Action Photo Coordinator

During an action or event, this role manages photos from the on site photographers, processes the images and uploads them so they are accessible for the media and social media Credit: Leard Blockade Role: Communication with Photographer and Videographer/s Take images...

Action Photographers Guide

Guide to help photographers prepare for an action or event Started by Chelsea, Sam and Rachelle | Leard Blockade Day/Night Before Action Prepare gear camera-set to raw and jpg (or just jpg) lenses (wide, mid-zoom, and telephoto) batteries-charged Memory cards...

Action Videographers Guide

Guide to help Videographers prepare for an action or event Started by Joao Dujon Pereira Media agencies rarely run a story longer than 1 1/2 mins for their news feeds, so there for they do not require a lot of footage in order to edit their story. News agencies...

Social Media Guide for non-action days

This example is from the Frontline Action on Coal. Voice and Style: Who is FLAC? FLAC is cheeky and a bit of a smart arse, but this comes from a well informed place. FLAC doesn’t peddle lies, but rather relies on fact and science to make the story true. That being...

Setting up an Activist Camp

Notes from Camp Meeting Tabulam. Workshop content by Murray Muzz Drechsler Finding a location Not under trees- dropping limbs and limbs thrown in storms -behind a windbreak to protect from wind and storms- different sized trees but not big eucalypts Gullies are not...

Safer Spaces Policy

This example policy is from the Leard Blockade Camp Wando is a safer space. Everyone is welcome (Except cops), but there is no place here for sexism, racism, homophobia, transphobia, ableism, ageism, classism or discrimination based on nationality, gender identity,...

Participation Agreement and Safety

This Participation Agreement and Safety example is from Reef Defenders Always remember RESPECT COUNTRY, CULTURE & COMMUNITY and always act NON-VIOLENTLY towards others, yourself, creatures & the land. HAVE FUN AND ENJOY THIS BEAUTIFUL, SPECIAL, PLACE.  ...

Code of Conduct

this example is from Random Hacks of Kindness All attendees, sponsors, partners, volunteers and staff at RHok Australia events are required to agree with the following Code of Conduct. Organisers will enforce this code throughout the event. We are expecting...

Please Note

Security is always changing so do some extra research yourself about recommended tools.The safety of tools can change suddenly if we learn of new exploits or risks with tools. Sometimes great tools get sold to dodgy corporations. Please use these recommendations in...

Why Secure myself? – I am not doing anything worth spying on

Many people believe that they are not worth spying on. There are many reasons to protect yourself and your community including: you dont want to be spied on or tracked you support the concept of freedom and the right to protest you are a radical activist who may be...

Why Bother, they can access all my data anyway?

Sort of yes and mostly no Five Eyes The 5 eyes system dragnets all communications on the internet, in addition to relationships with tech companies to access data via the prism program. This is done by by the top level of state spy agencies. These agencies are not...

Who are we protecting from?

Security has many levels and protects you from different levels of spies. It is important to understand, the people more likely to target you are probably the least sophisticated. This means any improvement to your security will go a long way. Also, mass surveillance...

Herd Immunity – My part in protecting everyone

They are looking for a needle in a haystack. Currently most of the hay is easy to search and therefore the needle is easier to find. If every straw is much more difficult and expensive to search, then finding that needle becomes a massive challenge. We call this Herd...

Don’t let Paranoia stop you organising

Although they come with risks, digital tools allow us to leverage our actions and communications in unprecedented ways. If we stop using the these tools due to security, we have lost before we have even started. Use the tools wisely. Some risks are involved but...

Convenience VS Security

Some security technologies can be less than convenient. Typing long passcodes into your phone and surfing with slower internet speeds via tor. It is up to you how much you balance security and convenience. Many security approaches and technologies do not impact on...

Be geek street-smart – Security is not perfect

High end security is very complex and can make using your technology less convenient. The aim of this guide is to implement good security and not perfect security. Security improvement is an ongoing process. Unless you understand the technologies of a technical level,...

Digital literacy – learn your technology

Computers have given us powerful tools that also need maintenance and management. Learning the basics of how your computers and phones work, will make you far more savvy in understanding digital security

Encryption works – What is encryption?

The Snowden leaks has proven that encryption works and we can protect ourselves from spying. Encryption involves using advanced mathematics to scramble your data, making it impossible to access without your key (password). I will not explore the technical aspects of...

Encrypt all devices, drives and sensitive folders

What is encryption? Encrypting is usually a simple matter of turning encryption on via your devices settings. By enabling encryption you make hacking your device either impossible or very difficult and resource intensive. “Standard” password protection...

Multiple backups

Your data can be lost in many ways: Fire, theft, failure, arrest, loss etc. You can also lose data if you apply some security measures incorrectly. Make sure you have adequate backups before you start securing and encrypting. External Drive Backups Large external hard...