Skip to main content

Adding/Removing label from blog post : Blogger

You can add label to your post for better management of the post and also your blog users can find topics more relevant to their requirements.

So let's start with adding a label to your post :

Step 1 : Go to your design dashboard and click on post link which is present at your left hand side.This will show you all of your post that you have posted so far.

Fig. 1

Step 2 : Now select the post to whom you want to assign labels.

Step 3 : Click on the label like icon on the right hand side (highlighted in the below image). This will show you a dropdown which will list all the labels that you have created so far, if there are no labels present then it will just show you "New Label..." text.

Fig. 2

Click on New Label... text which will show you an pop up with a text field in it. Enter your desired label name and click on Ok. This will add your selected post under that label.

Fig. 3


Removing a Label for a post :

Follow till step 2 then click on the label icon as shown in Fig. 2 and again selecting the same label that is already assigned to the post will remove that label for the post.

Hope this was helpful. :) do let me know your views on this and do share this if you like it, even if you don't no issues :)
Enjoy blogging.

http://www.indiastudychannel.com/resources/157026-Add-Remove-label-from-blogger.aspx

Comments

Popular posts from this blog

Carnivorous Island from "Life of PI"

Yann Martel described about an floating carnivorous Island for symbolizing that something seemingly good in life can turn out to be harmful, so we should keep going with our journey of life... About the carnivorous Island from movie. In the movie 'Life of PI' after PI struggles to live in the pacific with the Bengal tiger suddenly one morning Pi  found himself at a Island. After spending so many days in the middle of the sea he found himself very lucky to find a Island. After spending some time he thought might be this was the end of his suffering and he can spend rest of his life at that island. He makes h is bed on a tree and sleeps there, in the middle of the night he wakes up and find that there were dead fish in the fresh water where he took swim in the day time. While trying to understand the mystery he plucks a fruit from the same tree and peel it off and finds a human tooth inside that fruit and then he realize that it was an carnivorous Island. The...

Create Table in Liquibase

For creating table using liquibase you can use below code and add it in your liquibase file. <createTable tableName=“employee”>      <column name="id" type="int">      <constraints primaryKey="true" nullable="false"/>   </column>      <column name="first_name" type="varchar(255)"/>   <column name="last_name" type="varchar(255)"/>   <column name="username" type="varchar(255)">      <constraints unique="true" nullable="false"/>   </column> </createTable> The use is pretty simple it's the way it looks : Tag: <createTable></createTable> This is an opening/ending tag for creating a table. These tags will enclose column sub tags which will define columns for the table. Attribute:   tableName : Name of the table which you want to create. (This is a mandatory   ...

Everything you need to know about ShellShock.

Shellshock was a security threat that was identified by Stéphane Chazelas on 12 September 2014 and was disclosed and announced to the public on 24 th September 2014 with the fix ready for distribution. It was assigned the identifier as CVE-2014-6271 . By the way, this is another security bug with cool logo after Heartbleed. 1. What is Shellshock? Shellshock is a name given to a vulnerability in Bash which allows an attacker to execute remote commands on vulnerable system. Bash is a command-line interpreter available on most of the operating systems like Apple’s OSx, windows and present on many versions of Linux. Bash also acts as a parser for the functions given to it.  2. Why is it harmful? Shellshock is significantly harmful for the servers connected to internet. Since, it lets attacker to escalate their privileges and potentially they can gain access to root. This gives access to the attacker as if they are the actual user and they can perform any...