I strongly second that. It is very difficult when you have bought many items to know whether you are up to date in your downloads. Also, sometimes, you might want to keep an history of the files.
I would recommend to add the version number in the zip name.
It’s way easier with timthumb and can’t see any problem with it.The problem is just that, to do it, it needs 777 chmod. And 777 chmod should never be authorized
That might be the reason why WP Core cannot to it.
You have plugins like Load from server that can move your images to the proper place without reuploading them, you have pluggins like Image Grabber that can load any image into your repertory, and you have plugins like Custom Upload Dir that gives you high flexibility in the way you organize your media folder. Without security leak.
WP isn’t capable of getting those thumbs manuallyAgain, can you explain me what Timthumb does that the standard API does not ?
Hello, I’m an admin of WordPress french users association, and I’m definitively no amateur. I worked with Aphrodite on his problem and he is perfectly right, the source of the malware was timthumb
I personnally never used any theme with Timthumb, even before the security leak was revealed. I don’t understand something that “needs” a 777… basic security.
If you theme uses Timthumb, can you explain the advantages of the script and why is it so needed when you have a proper thumb system with Wordpress ?