Blog

WordPress 5.6 Introduces a New Risk


WordPress 5.6 will come with a new feature that allows external applications to request permission to connect to a site and generate a password. Once the application has been granted access, it can perform actions on behalf of a user via the WordPress REST API. An attacker could trick a site owner

Read more

Block Tor (The Onion Router) Traffic


The Tor Project makes a browser that allows anyone to surf the Internet anonymously. Tor stands for “the onion router”. Anonymity is also something that provides value to online attackers.  95% of requests from the Tor network are per se malicious and they are automated requests

Read more

What is Pingback? Why should we disable pingbacks?


Pingback allows you to notify other bloggers that you have linked to their article on your website. Although there are some minor technical differences, a trackback is basically the same things as a pingback. If the other blogger or author has a Pingback enabled website, then they can see a

Read more

Why Disable file editing within the WordPress dashboard


When file editing is enabled, Administrator users can edit the code of plugins and themes directly from the WordPress dashboard. This is a potential security risk because if a hacker breaks in, they would have access to all your data. You can use our plugin to disable it.

Why Stay Up-to-Date?


Stay Up-to-Date:  Nearly every WordPress website that is not updated will be hacked sooner or later. Hackers make scripts that search the internet for vulnerability in WordPress themes and plugins.  Our plugin has the option to set WordPress to automatically download and install themes and

Read more

Why block false (fake) Google and Bing (MSN) bots


Web crawlers are programs or automated scripts that scan web pages methodically to create indexes. such as Google, Bing, and others. Today there are also many crawlers that impersonate for malicious purposes. Our plugin can block them.

How the Firewall Works?


A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on security rules.  It can establish a barrier between a trusted internal network and the Internet. Our Firewall is: 100% Plug-n-play functionality No configuration required Blocks

Read more

What means replace the insecure login error message?


Error login messages may expose and give hackers an idea if they’ve gotten username correct/incorrect, vice versa. It is wise to hide it from unauthorized login. Our plugin can replace it for “Wrong Username or Password.” 

Why should I avoid keeping wordpress in debug mode?


During development of plugins or themes, as well as during deployment of a WordPress site, developers or system administrators may enable debug to see any PHP errors that occur. WordPress makes use of the WP_DEBUG constant which is defined in wp-config.php. The constant is set to be false by

Read more