In this post we will look to the subject occupies all users of the platform is WordPress and how to protect their blog or their location, including that prevention is better than cure, we will start entry methods that help protect your site from hack.
The first procedure: When the installation of WordPress is advisable to change the database tables of wp_ to code has nothing to do in the name of the field or your site for this purpose you can use added Change Database Prefix
The second procedure: Change the link leads to a page for a site management. In the sense that you can not access the administration page via the usual link, but rather through a special link is unknown by everyone except the manager or managers of the site, you can add this feature through programmed in .htaccess or Boisthaladhavh the following: Move Login
The third procedure: choose a strong password for the site manager, making it difficult to guess it is better to contain letters and numbers and symbols Example: ahgYHT12_ /?
Fourth action: avoid guessing attacks: using some hacker programs to guess the password; when it will be very useful to identify the number of failed attempts to enter the password, and prevent attempts when exceeded will reach an electronic message containing the device that tries to access to your account, in case of IP What was strange device are banned from access to the site; you can take advantage of this feature by using add-Limit Login Attempts
Fifth Action: inauguration last versions of WordPress and cared for continuous updating to WordPress, additives because they are often issued to correct security flaws have been discovered
VI procedure: Clear Meta crown that contains the version Aluwrdberas code, because there are sites that allows you to discover the specific version gaps ranging enough that its code.
Open open the page header.php and scan the following code:
<meta name = "generator" content = "WordPress <? php bloginfo ('version'); ?> "/>
Seventh procedure: Find the implications before giving permits for files For example, you should not give permission for any file 777; because this declaration allows reading and writing to the file. And to get a sufficient amount of protection suggested changing thread permits to 404 or 444 and 505 or folders to 555.o should start changing the permit .htaccess and wp-config.php to 404.
Eighth procedure: can be used in addition askapache password protect to protect the admin file, it is the creation of a firewall to prevent attempts to hack.
Ninth procedure: constantly look for add-ons that have been discovered gaps in order to be updated or deleted, and the periodic survey of the site or blog to detect any security flaws by using additives such as wp security scan
And left another advice is to keep your backup site where they can take a copy of the last update for the site Tlath every day or every week, this period varies from one location to another; can add wp db backup use.
If you liked entry was not stingy on the published and leave your comments, to the meeting in another blog post by touching to what to do in the case you have been infiltrated.
The first procedure: When the installation of WordPress is advisable to change the database tables of wp_ to code has nothing to do in the name of the field or your site for this purpose you can use added Change Database Prefix
The second procedure: Change the link leads to a page for a site management. In the sense that you can not access the administration page via the usual link, but rather through a special link is unknown by everyone except the manager or managers of the site, you can add this feature through programmed in .htaccess or Boisthaladhavh the following: Move Login
The third procedure: choose a strong password for the site manager, making it difficult to guess it is better to contain letters and numbers and symbols Example: ahgYHT12_ /?
Fourth action: avoid guessing attacks: using some hacker programs to guess the password; when it will be very useful to identify the number of failed attempts to enter the password, and prevent attempts when exceeded will reach an electronic message containing the device that tries to access to your account, in case of IP What was strange device are banned from access to the site; you can take advantage of this feature by using add-Limit Login Attempts
Fifth Action: inauguration last versions of WordPress and cared for continuous updating to WordPress, additives because they are often issued to correct security flaws have been discovered
VI procedure: Clear Meta crown that contains the version Aluwrdberas code, because there are sites that allows you to discover the specific version gaps ranging enough that its code.
Open open the page header.php and scan the following code:
<meta name = "generator" content = "WordPress <? php bloginfo ('version'); ?> "/>
Seventh procedure: Find the implications before giving permits for files For example, you should not give permission for any file 777; because this declaration allows reading and writing to the file. And to get a sufficient amount of protection suggested changing thread permits to 404 or 444 and 505 or folders to 555.o should start changing the permit .htaccess and wp-config.php to 404.
Eighth procedure: can be used in addition askapache password protect to protect the admin file, it is the creation of a firewall to prevent attempts to hack.
Ninth procedure: constantly look for add-ons that have been discovered gaps in order to be updated or deleted, and the periodic survey of the site or blog to detect any security flaws by using additives such as wp security scan
And left another advice is to keep your backup site where they can take a copy of the last update for the site Tlath every day or every week, this period varies from one location to another; can add wp db backup use.
If you liked entry was not stingy on the published and leave your comments, to the meeting in another blog post by touching to what to do in the case you have been infiltrated.