WordPress is a very popular fully open source software. In terms of security, the biggest benefit is that there is a huge community that can find bugs and security risks faster than internal CMS solutions. (when a method found is actually malicious exploitation of a vulnerability, it is difficult to find the vulnerability. If there is a large user base, the probability of discovery will be much greater.) The downside is that malicious hackers know exactly how the site is built. They already have a \
Therefore, this post will show you how to modify the five security threats in the default installation of WordPress. (if you have taken some precautions, you may find that oneortwo items have been modified, but to minimize the risk of hacker attack, it is important to modify all five items.) Your website shows that you are using word press and version. The default version of WordPress has code lines that tell users that the website is built using WordPress, and can even be provided to people who know where to look. Depending on the topic, all pages on the site may be displayed visually. The
This is a security risk because people have no other reason to target your site than to build it in WordPress. If someone finds a security vulnerability in the word press core, theme or plug-in, they can go to the site for malicious exploitation. On the contrary, if you successfully conceal that your site is built as WordPress, the person who uses a robot or mouse wheel to search WordPress sites will deceive you into thinking that your site is not a runnable object. Solution: hide my WP plugin can be used to solve this problem. This useful little plug-in can avoid unnecessary traffic on the server and protect the server from attacks against WordPress sites. The
Everyone knows where your landing page \/ admin area is. If it indicates that you are still using WordPress (for example, you use hide my WP and other plug-ins, and do not actively hide them), you may already know where malicious users are trying indiscriminate targeted attacks on the website. Solution: to modify this threat, greatly reduce the possibility of hacker attacks and reduce the pressure on the server, malicious personnel and robots must be prevented from reaching the login page. There are two main ways to do this. You can use the plug-in (or a few lines of code) to change the physical location of the login page to a different location, or restrict access to the login page and the management zone to IP addresses. This can be done using plug-ins dedicated to this specific feature or security plug-ins such as Sucuri, wordfence, ithemes Security Pro, or all in one WP security and firewall. The
WordPress contains the default table prefix that everyone uses. The table prefix precedes the table name in the database. If you use the standard WordPress prefix instead of users, you become wp\u users. The default table prefix makes it easier for people to access the site by taking advantage of possible SQL injection weaknesses. Because they clearly know where to inject information into the database and access the site. In fact, due to SQL injection, one of my websites was hacked, which is a very practical threat that requires countermeasures. The
Solution: thankfully, eliminating this threat is easy. Default wp_prefix
Inserting oneortwo lines of code has greatly reduced the risk of the site being infected by hackers or malware. Do you take steps to improve the security of your WordPress site? What kind? I want to hear your secrets and tips! Please tell me your opinion.