WordPress Security For Webmaster 2021 How To Stop Hackers Breaki
WordPress Security For Webmaster 2021 How To Stop Hackers Breaki
me/ThDrksdHckr
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
WordPress Security
for Webmaster 2021
Contents
A Little History
A Note About UK v US English
Found Typos in This Book?
SECTION 1 - About Security & Hacking
Chapter 1 – Introduction
Chapter 2 – Why Do Hackers Hack
Chapter 3 - WordPress Is Secure, But…
Chapter 4 - Learning What Needs to Be Secured
Backup Your Website
Installing & Setting up UpdraftPlus
Threat 1 – Passwords
Threat 2 – WordPress Usernames
Threat 3 – Signing In
Threat 4 – PHP Error Reporting
Threat 5 – File Editor
Threat 6 – Control the Content Published on Your Site
Threat 7 – New Users
Anyone can register
Usernames & Passwords
Threat 8 – Widgets & Code
Embedding Code in a Post or Page
Threat 9 – Plugins
Threat 10 – Themes
Threat 11 – Comment Spam
Links in Comments
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
A Little History
In the early days, websites were hand-built using a special code
called HyperText Markup Language (HTML). To create good-looking
websites back then, you had to be something of a geek. Then,
special tools came onto the market to reduce the learning curve
associated with building websites in HTML. Two of the more
popular ones were Macromedia Dreamweaver (now owned by
Adobe) and Microsoft Front Page (discontinued in 2006). The
problem with these web development tools is that they were
expensive.
In May 2003, Matt Mullenweg & Mike Little released a new tool that
would change the face of website building forever. They called it
WordPress.
I have to admit I was a little reluctant to give up my copy of
Dreamweaver at first. But in 2004, I began to experiment with the
WordPress platform. It was a time when WordPress was just starting
to get interesting. This was thanks to the introduction of something
we now know as “plugins.”
Fast-forward to today, and WordPress is now the site-building tool
of choice. It's popular with professionals and enthusiasts alike.
Home-based businesses run by moms & dads love it, as do school
kids running blogs about their favorite bands or video games.
Today, even large corporations use WordPress and just about
everyone else who builds websites.
WordPress is extremely powerful, flexible, and produces very
professional-looking websites and blogs. It's pretty easy to use too,
but best of all is that it's 100% free.
The other advantage of WordPress is that the code is freely
available to anyone who needs it. This same advantage, though, is
also its biggest security threat. The open nature of the code means
developers can create exciting new plugins and themes to extend
the functionality. Alas, it also means hackers can find security
holes in the code and use them to gain illegal access to WordPress
websites.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
There are other places in the dashboard that use localized words
like this. I’ll leave those for you to find.
Chapter 1 – Introduction
In 2018, a report by infosecurity-magazine.com suggested that
WordPress accounted for 90% of all hacked sites, up from 83% in
2017. WordPress is a target for hackers because of its huge user-
base. Fortunately for you, WordPress's “core” is very secure.
Unfortunately for you, hackers find their way into sites because of
mistakes made by site administrators and security holes in third-
party addons like plugins and themes. One report I read suggested
that 98% of WordPress vulnerabilities are related to plugins.
Another, more conservative report suggested that figure was 52%,
but it’s still a large number. Another statistic showed that 8% of
WordPress websites were hacked because of weak passwords.
According to Sucuri, 61% of infected WordPress sites are out of
date. WordFence, a company specializing in WordPress security,
said there were 90,000 attacks per minute on WordPress websites.
Hackers hack websites for a variety of purposes. Some will want to
redirect your traffic. Hackers also attempt to steal customer
details, delete files, or change your login details to lock you out.
Some will send spam emails to millions of people, SEO for the
hacker's site, and other, more sinister reasons.
Don’t think that your small, insignificant site is safe from hackers—
it's not. To a hacker, a site is a site, and they'll attack it if it serves
their purpose. They use computer software to auto-scan millions of
websites for vulnerabilities. Once found, they'll attack any soft
targets they come across. There is no softer target than a newly
setup WordPress website run from a bedroom.
There are good reasons to worry about your website security.
Despite the scare, I don't want you to avoid WordPress thinking it's
an insecure platform. As I’ve already said, it isn't. When the
WordPress security team finds a security hole, they usually plug it
fast. They then automatically push the update out to all WordPress
installs.
The real security issues derive from the folks who run the websites.
They often don't have the knowledge to make the best-informed
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
decisions. They don't know enough about content, the plugins they
use, or the themes they install.
This book has two aims:
1. I want to give you the knowledge you need so you can
understand where the main threats come from. With this
knowledge, you'll understand how your administrative
actions can affect the security of your website. Your new
understanding then gives you the power to stop hackers.
2. I want to give you a step-by-step solution to make your
website as hackproof as possible. We'll install an excellent
WordPress plugin and go through the entire setup process.
For your part, just follow along on your site as I secure one
of my own.
If you're not technically minded, don't worry. This book assumes no
technical ability and no programming skills.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
I can promise you that once you've finished this book, your site will
be a lot more secure than most other WordPress websites. The type
of hacker that's usually responsible for hacking an average website
is not going to have the time, patience, or resources to break into
yours. Remember, most of these guys look for "soft targets.”
There are two sections to this book. You can treat the first one as
information-only if you like. I show you some manual procedures
for securing against hackers in this section. However, you don't
need to do anything as you read the first part. The second section
covers a WordPress plugin that secures against all the important
threats. This is where I show you the step-by-step instructions on
how to install it and set it up to secure your site.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Some only do partial backups like the database. The more useful
ones will backup both the database and all the files.
You may think that the only way to do a proper backup is to do a
full one. First, you need to be aware of the file size of these
backups.
The database-only backups are typically 1-5 MB in size. You can
even have these emailed to you.
Full backups can be gigabytes (GB) in size, and they use a lot of
server resources to process. Clearly, you cannot receive these by
email.
The solution is to use a plugin like UpdraftPlus. There's a free
version, which is more than adequate for most users. The premium
version is great for anyone who needs more power and options.
UpdraftPlus' free version can automatically backup your site to a
remote storage location on a predefined schedule. It includes
popular online storage like Dropbox, Google Drive, and Amazon S3,
to name a few. If anything should happen to your hosting server,
you have offsite backups to fall back on.
To find out more about Updraft, please see:
https://ezseonews.com/updraft
As I write this book, you can see the plugin is actively in use by 3+
million websites. It is also updated regularly.
Install and activate Updraft.
Once active, you’ll find a new menu under the Settings menu,
called UpdraftPlus Backups .
Clicking on it takes you to a screen showing the current status:
In your case, there won’t be any backups yet, but there is a big
Backup Now button that I recommend you click.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Click your chosen remote storage to select it. I’ve chosen Dropbox
for mine. When you select a remote storage option, more settings
will appear on that page related to your choice.
The settings below appeared when I selected Dropbox:
There's also a useful option to have an email report sent with the
backup details.
Now click the save button at the bottom of the screen. That's all
there is to it.
Over on the Backup/Restore tab, you should see a date in the
Next Scheduled Backups section. This is when the next
automated backup will take place.
You can also create a manual backup right now by clicking the
Backup Now button. You’ll then get the option to: Send this
backup to remote storage :
With backups done, you now have everything you need to restore
your site to its present glory in any eventuality. It's effectively
100% secure already.
With the site backed up, let’s now learn of the threats to your
website security.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Threat 1 – Passwords
Earlier in this book, we identified passwords as one of the weakest
links in WordPress security.
If you have a strong password, then you have a strong foundation
on which to build other security measures. So, what forms a strong
password?
There are a few considerations when deciding on a strong
password. It should include all the following:
· A random collection of characters
· Include numbers
· Include upper and lower case
· Include special characters
When it comes to passwords, the longer they are, the better.
When they released WordPress 4.3, they introduced strong
passwords by default. There is also a tool inside the WordPress
Dashboard to generate super secure passwords if you need one. You
can find it in your user profile:
If you look at the password, you can see it meets the criteria I
specified at the start. It’s random, includes numbers, upper and
lower case, and special characters (#, & and %). It’s also a lot
longer (24 characters) than the passwords most people make up
themselves.
The tool will also give you an idea of how strong your password is.
Type it into the box and make sure your password reads Strong
under the data input field.
I know most people’s objections to this type of password.
It’s impossible to remember.
That's correct, but there are some great tools out there. These
tools not only remember your passwords, but they can also auto-fill
them for you as well. I use a tool called Roboform and can highly
recommend it. Roboform remembers all my secure passwords (and I
have hundreds), and it automatically fills them in for me whenever
I visit a website.
NOTE: If you're just installing WordPress, you won’t have access to
the Dashboard yet, or the password generator tool. Never mind. Do
a Google search for secure password generator instead. You'll find
a few tools which can create these strong, random passwords for
you. Lastpass is another popular password manager that provides a
free secure password generator. You can get it here:
https://lastpass.com/generatepassword.php
Here are your options with this tool:
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
You can also find free tools online that will check how secure a
password is. Here's one example:
Before you move on in the book, make sure you update your
password, if necessary, to make it strong and long.
If you need software to remember passwords, I highly recommend
LastPass, which has a good free version:
https://www.lastpass.com/
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Threat 3 – Signing In
When you log into your website, make sure you check the address
bar at the top of your browser BEFORE you log in. You should do
this check before signing into ANY webpage, whether it’s your
bank, Paypal, or even your Facebook account.
If you ever need to see the error messages in the future, simply
come in and remove this line of code while you're working on your
site. You can either delete it or comment it out using the format
below:
/* error_reporting(0); */
The /* at the start and the */ at the end stop any commands inside
from being read. When you’ve finished the work on your site, you
can remove the comment markers to once again disable PHP error
reporting.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
The problem we have is that anyone with access to these files can
“inject” malicious code into your website. So, if the logged-in user
is a hacker, the consequences can be catastrophic.
The good news is you can disable these editors by adding a single
line of code to your wp-config.php file.
I'm going to show you how to do this manually, but this is for
information only. The plugin we install in the second part of this
book will do the work for you.
For those who want to do this manually now, here's how it works.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
I’ve drawn an arrow at the point where I'm going to insert the line
of code.
Position your cursor in the blank line right before the line that
starts:
// ** MySQL settings - …
In this line, insert the following code:
define('DISALLOW_FILE_EDIT', true);
When you've done that, save your wp-config.php file and make sure
it overwrites the older version.
Now log in to your WordPress Dashboard. You'll no longer see the
options to use the editor. Here's how the Appearance menu looks
now:
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Threat 9 – Plugins
Plugins are pieces of code that add new features to your WordPress
site.
Since code can control pretty much every aspect of a site,
including malicious things, you need to be sure you can trust the
plugins you use.
Although much of this is also common sense, here are a few helpful
tips:
· Only install plugins from trusted sources. The WordPress
repository is the main trusted source. But what if you find a
plugin on a website that isn’t in the repository. In this case,
do your due diligence and check out reviews and customer
comments on those plugins.
· Developers who create free plugins come in two forms.
There are the good guys who are happy to help and want to
create a useful, free plugin with no strings attached. Then
there are those who want to profit from their free plugin.
There are several ways to do this. The most common method
is to give away a free trial version. They hope you’ll upgrade
to a paid version with more features and functions after the
trial period. These can be fine but again, do your due
diligence.
The type of plugin to be wary of are those which include
code that doesn't directly contribute to the functionality
you're trying to gain. For example, a mortgage calculator
that adds a link back to the lender’s website. In this case,
you want the functionality of the calculator. Yet, the bank
has included other, unrelated code to that function. In this
case, it's a link pointing back to their website. My advice is
to avoid this type of plugin at all costs.
· Always keep plugins up to date. Be wary of those that
have no known updates or have not had an update in a very
long time. There are also legitimate plugins that just don’t
get updates. For example, they use secure code, and the
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
·
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Threat 10 – Themes
Themes, like plugins, add code to your website.
The same kind of common-sense measures we talked about for
plugins also apply to themes. Here are some guidelines.
· The WordPress theme repository is a safe place to get
themes. Many people still want to look further afield to find
the best themes for their website. Be careful where you get
yours from. Again, do a search on Google for the theme in
question and see whether it appears to be from a trusted
source.
· Some authors offer free themes. They usually include a
link in the footer (or elsewhere) back to the developer's
website. On the face of it, the deal looks sweet. NEVER use
a theme that forces this type of site-wide link on you, no
matter how subtle. Why? You have no control over the
destination website attached to that link. The link may
redirect, either now or later on, to any site the author
chooses, e.g., porn, gambling, and so on. This type of site-
wide footer link will also cause you SEO problems in Google.
The search engines don't like them, not even if the site it
links to is a trusted one.
· Keep themes up to date and install updates as soon as
you know about them. Theme developers might release an
update to add new features, but it could also be to plug
security holes.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
versions between 3.9 and 4.2 were vulnerable to this hack. The
developers have since patched more current versions to prevent
these attacks from happening.
So now your site is up to date and safe against the Zero-Day
exploit. But hackers are smart people, and they're always looking
for new ways. For that reason, I recommend you always check the
first box in that section:
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Now you have to manually approve ALL comments. This way, you
can check the comment for code before you accept it. Moderating
comments is also a good way to make sure no nasty language or
hostilities end up on your pages.
Links in Comments
When a visitor leaves a comment, they have two opportunities to
insert links into it. They can add a URL in the URL box of the
comment section, or they can insert a link into the body of the
actual comment:
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
This plugin is free for one user. If you want to protect more than
one site, you'll need to sign up for one of their plans or find a
different plugin.
After you install and activate it, you’ll see a new menu item in the
sidebar labeled miniOrange 2-Factor. When you click on that, it
takes you to a simple setup screen.
I won’t go into detail on how to set this up, but it's fairly intuitive.
On the Setup Two-Factor tab, you can select the method of the
verification, including:
· Email
· SMS
· Phone Call verification
Is this type of protection worth setting up? Well, that's up to you. I
find it a little too much hassle, so I don’t use it on my websites.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
If you protect your login page, you reduce the chance of a hacker
gaining access.
Fortunately, there are a few ways to protect the login page. You
can rename it, move it, add a Captcha, or block certain IP
addresses.
Some methods of protection are more effective than others. The
plugin we install in the last part of this book gives us some great
options, so no need to worry about this right now.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Threat 17 – XML-RPC
XML-RPC is a programming interface (API). What it does is allow
programmers and developers to talk to WordPress.
A lot of tools may need XML-RPC to work properly. For example, I
use Open Live Writer to work offline on my websites. This gives me
a WYSIWYG (What You See Is What You Get) editor. I use it to
create and format posts or pages that I can then publish to my site
when I'm ready. Open Live Writer requires XML-RPC to be enabled
for it to work.
Some plugins also need XML-RPC, like Jetpack.
Since WordPress 3.5, XML-RPC is enabled by default.
The problem we have is that software can manipulate WordPress
through the XML-RPC. This makes it a possible security concern. A
lot of WordPress gurus recommend you disable it.
In the past, hackers used XML-RPC for something called DDoS
attacks. It stands for “Denial of Service.”
Plugins like Akismet can usually spot this type of attack and
prevent it. Therefore, it may not be worth switching off XML-RPC
to stop DDoS attacks.
Hackers also extensively used XML-RPC for brute force attacks. But
again, most security plugins will prevent this type of attack today,
so it's not worth worrying about. The plugin we setup later also
prevents this type of attack.
My suggestion is not to disable it. If you decide you want to, then
some plugins can disable it for you. Check out this one:
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Threat 19 – wp-config.php
The wp-config.php file contains sensitive information. This includes
things like security keys & salts, usernames, passwords, and
database names, etc.
If a hacker gets hold of this file, they'd be a lot closer to hacking
into your site. For this reason alone, it's a good idea to protect the
file in any way you can.
One way to do this is to move the file to a folder above your
WordPress installation directory. Some people will tell you this is a
good idea, while other security experts will disagree. I don't do
this.
An alternative is to put the following code into the .htaccess file
for your website.
<files wp-config.php>
order allow, deny
deny from all
</files>
Like this:
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Note that the permission for this file is 0644 (in the 'Oc tal' box). So
644 is a number made up from the permissions table above. Each of
these permissions has a value.
Example: For owners, the Read permission has a value of 400 and a
Write value of 200. Execute would add 100 points to this
permissions value.
For “Group,” the Read permission has a value of 40 and a Write a
value of 20. You may be able to guess the execute permission for
the group has a value of 10.
For “Others,” Read, Write and Execute are an order of 10 smaller,
so 4, 2, and 1 respectively.
In the screenshot above, you can do simple maths. We have:
· Owner read (400) and write (200) = 600 total.
· Groups read (40) = 40 total.
· Others read (4) = 4 total.
Therefore, the total permission for this file is 600+40+4 = 644
Fortunately, you don’t need to remember any of this. I'll give you a
guide to what permissions your files and folders should have, and
you can check them if you want. The security plugin we install
later checks and fixes permission issues for you anyway. There's
nothing for you to do at the moment.
Each item in the popup menu opens a page of settings you can
change.
Click on the “Dashboard” link in the menu. You’ll get a graphical
interpretation of the current security measures on your site.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Now you have the three important files safely on your computer in
case of a problem.
In the next chapter, we look at the steps to take if the plugin locks
you out of your website.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
IP Lockout
One of the main reasons the plugin locks people out is if their IP
address triggers the security settings. If it locks your IP address,
you won’t be able to login to your Dashboard with that particular
IP.
The simplest solution is to use a VPN. This lets you change the IP
on your computer as if you were in a different location, even a
different country. There are a lot available; just search Google for
VPN service.
When the system logged me out in the past, the first thing I would
do is change my IP using a VPN service. I'd then log in and make the
necessary changes to the plugin settings. I'd say this works fine in
99% of all cases, without the need to restore any files.
If you don't have, or want to buy a VPN service, then work your
way through the next section.
process.
Step 1. Disable the plugin
Step 2. Reverse any changes the plugin made.
Open the wp-content folder and then the plugins folder inside that:
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
You’ll see the All In One Security plugin is there and deactivated.
You can now activate it again.
The settings for the plugin that locked you out will have been
reset, so be careful going forward. Don’t enable something that
locked you out previously.
The Last Option in case all else fails is: Restoring Files
If the previous option fails, and it never has for me, there is one
final option. Restoring files from backup.
The problem with restoring files is that you lose all customizations
to the plugin settings since the last backup. In other words, say you
took the backup before you began to configure the plugin. This
means — after the restoration — you'll have to reconfigure it all
again from the start.
One thing that can make life a little easier is if you back up the
files periodically as you set up the plugin. Then, if a problem does
arise, you can restore the files starting with the most recent
backup. If necessary, you can work backward until you find the
backup file that fixes the issue.
So, you need your backup files to restore your site in the event of a
problem. We saved those to your computer in the last chapter.
The chance is you'll only need to restore the .htaccess file as it's
where the plugin makes most of its changes. If WordPress does lock
you out, I recommend you try to restore functionality in the
following order:
1. Restore the .htaccess file and check to see if you can get
in. If you can, you don’t need to follow step 2. If you can't,
keep reading.
2. Restore the wp-config.php file and check to see if you can
get in.
After completing steps one and two, you should have access to
your site. If not, then clear cookies in your browser and try again.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
If you still can't get in, I recommend you go and rename your
“plugins” folder. This is the last resort, but it does work. You can
then log in, but you'll get some error messages. Ignore them. While
you're logged in, rename the plugins folder back to its correct
name and refresh the browser. You should now be able to access
the Security settings and make the changes.
I've never seen an instance where you'd need to restore the
database because of the security plugin. The database backup is
very useful in case your site gets hacked, and you need to restore
the content. However, for a full backup, I recommend you look at
the Updraft plugin we mentioned earlier.
To do this:
1. Upload your backup to the root folder of your website.
2. Delete the original.
3. Rename your backup (which will have a random name
created during its backup) to .htaccess.
If you are not sure which is the root folder of your site, you can
quickly identify it because it contains these three WordPress
folders:
You can also see the original .htaccess file in the root folder. For
Mac users, the .htaccess file is probably invisible by default, so
you'll need to unhide it to see it.
After you restore the backup .htaccess file, you should have
access to your site again through the regular login URL.
If you don’t, you can use the same procedure to restore the wp-
config.php file.
You should then get access back to your Dashboard. Now you can
start to set up the plugin again.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
At any stage, if you have problems, you can go back and restore
the files. Just choose the ones from the last working configuration
before you implemented the advanced strategies.
In the next few chapters, we'll go through all the setup screens and
most of the options: Basic, Intermediate, and Advanced. I'll tell you
the settings I recommend you enable. Some of these will be Basic,
some Intermediate, and a few Advanced.
The first time you go through these chapters, only activate the
basic features I suggest. Once activated and working fine, backup
the files and work through the chapters again. This time, enable
my recommended “Intermediate” features. After a day or two,
back up the files and work your way through these chapters again.
This time you'll enable my recommended “Advanced” features.
This is our strategy.
There are a couple of settings that I know cause issues for some
people. These can trigger the IP lockouts we looked at earlier. I'll
highlight those for you as we go through the settings. If the system
locks you out, once you get access again, go and disable the known
troublemakers first. Then log out of your site and back in again.
You can then start to re-enable these settings one at a time and
test them for a day or two before moving on.
OK, let’s begin by looking at the Dashboard screen.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Here we have the Dashboard tab selected. From this tab, you can
see the two graphical representations of your current security
strength.
The first one is a dial, from zero to 515.
515 is the maximum achievable score, though you won’t get that
high. At the 6 o'clock position, you can see my current score of 25.
The other graphic on this page is a pie chart. This includes a few
segments that represent the security measures currently in force.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
This pie chart gets more cluttered as you add extra security
measures to your site.
Before you start, I recommend you record your security strength
meter score. You can then compare it to your score at the end of
this book.
Have a look down at the other information on this Dashboard
screen. An interesting item is the Critical Feature Status . This
shows the enabled status for a few of the more critical features:
You have two ways to activate these. The first is to use the sub-
menus on the WP Security sidebar to access the correct settings
page. For example, you'll find the basic firewall on the Firewall
settings page.
A quicker way, though, is to simply click the “switch” on the
Critical Feature Status panel. Do that now.
By clicking the Login Lockdown switch, the system automatically
takes you to the settings page that contains the login lockdown
feature.
As you can see, this is on the User Login settings page, which you
can also access from the main WP Security menu.
This screen also has tabs across the top, and we were taken to the
Login Lockdown tab. This tab has a section called Login
Lockdown Options . Currently, we score 0 out of a possible 20
points.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
There are a few other options you can set up with this. I
recommend you leave most of the other settings at their default
values. There are helpful hints next to each checkbox if you want
to know what each one does.
However, one setting I do recommend you edit is the Instantly
Lockout Specific Username . Hackers often try the default
“admin” username when they attempt to get access to your site.
You should not be using that as a username. If you are, create a
new admin user with a more secure username, then login with the
new username and delete that “admin” username account. You
won’t lose any content created by that user because WordPress will
ask you which user you want to move the content to.
OK, so you are not using admin as a username. Enter “admin” into
the settings box:
Another item on that list you might want to think about is the Max
Login Attempts . Ask yourself whether you frequently mistype the
wrong username or password. If no, then you may want to reduce
this from 3 to 2. Or set it to 1 if you use a password tool for
entering passwords as there won't be any accidental login
attempts. This setting tells the plugin when to lock a user out of
your login page. If it's set to 1, when a visitor or hacker tries once
and fails, the system automatically blocks their IP.
You can also specify how long you want to lock someone out before
they can try again. Here, 60 minutes is the default and is probably
a good time to use. This is plenty long enough to deter hackers. But
it's short enough so that you don’t lose a whole day of work if the
system accidentally locks you out.
You can set up auto email notifications to inform you of any failed
login attempts. Just enter an email address at the end of the form,
and you're set.
At the bottom of the settings page, you can see a Whitelist . This is
useful if you want to make sure a certain IP address always gets to
login without issues. You can enter an IP address or range of IPs
into the box. My advice is to only do this if you know what your IP
will be every time you turn on your computer.
When you're happy with the settings, click the Save Settings
button.
The User Login screen will reload, and you'll see you've scored 20
out of 20 for the login lockdown feature. Click on the Dashboard
link to go back to the Dashboard.
Now recheck your security strength:
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
You can see how mine has increased by 20 points to 45. You can
also see a new segment in the pie chart. I now have three security
measures in place.
The next “critical” issue I need to fix is the File Permission
feature.
There are two issues that can be fixed by clicking the Set
Recommended Permissions button next to each item. This should
then give you the all-clear!
That has now gone up to 65 points, and the pie diagram has
another slice.
The final “critical issue” from the Critical Feature Status we need
to resolve is the Basic Firewall :
This screen has a few tabs across the top, and we'll come back to
look at these later. For now, you can see my score for Basic
Firewall Settings is 0 out of 15.
You can also see the “Basic” badge, so this setting is safe to use.
Check the box to enable the basic firewall. Now scroll to the
bottom and click the Save Basic Firewall Settings button.
Return to the Dashboard again to check your new security score:
As you can see, with every new security measure you enable, the
security on the site gets stronger.
There is one more thing I want to show you on the Dashboard tab.
Look for the Maintenance Mode Status panel.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
The current status is set to OFF, and you want to keep it off.
Switching it “On” enables WordPress maintenance mode, and your
site becomes unavailable to visitors.
Note: If you are logged in as an admin, you will still see your site as
normal.
Visitors will get a message — something you can define yourself
(we’ll look at this again later in the book).
There may be times when you want to enable this, e.g., when
you're doing work you don’t want others to see. It's not something
I've ever used, but you may find it useful.
OK, that’s the Dashboard tab covered. You'll also see a few other
tabs across the top. I won’t go into details on these as we don't
need them to set up your security. You can click on each one just to
see what's there.
1. System Info
This provides some information about your website, server, and any
software running on the server. For example, you may want to
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
know what version of PHP your host is running. This screen gives
you the information you need.
2. Locked IP Addresses
As the name suggests, this lists any current and temporarily locked
out IP addresses. These would include any IP addresses locked out
because of invalid login attempts.
3. Permanent Block list
This shows a list of all the permanently blocked IPs from your site.
4. AIOWPS Logs
AIOWPS stands for 'All In One WordPress Security.' This screen gives
you access to any log files used by the plugin. You can examine
them if you need to troubleshoot, for example. Most users won't
ever need to look at these.
This concludes our Dashboard settings.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Chapter 10 – Settin gs
Click on Settings in the WP Security menu.
Earlier in the book, we created backups of important files. We
created these backups using the Settings options. If you look at the
tabs across the top of the Settings screen, you probably recognize
them.
The General Settings tab provides links to back up the following:
1. Database
2. .htaccess file
3. Wp-config.php file
A useful feature on this screen is one we've not looked at yet. It's
the Disable All Security Features button.
This button turns off all security measures enabled in the plugin.
It's useful if you have problems with your site and can still log into
the Dashboard. The killer switch resets all security measures back
to their default settings. In my case, my security score would
return to 25.
Another option you have here is to Disable All Firewall Rules . It's
a less extreme measure to use if you think the issue relates to your
firewall settings. It will delete all firewall settings from your site’s
.htaccess file and thus disable the firewall.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
It’s a “Basic” feature, so it's safe to implement. Check the box and
click Save Settings . Your security score will go up by another 5
points.
The next tab is Import/Export . This allows you to export and
import your security plugin settings. This is useful if you are
setting up several sites and want to replicate the same security
settings on all sites. Simply export from the site that is configured
correctly, and then import those settings into all other sites. Of
course, I do recommend you check any site that has imported
settings, just to make sure everything is working as it should.
The final tab is for Advanced Settings .
This is an advanced feature that I don’t recommend you change
unless you know what you are doing. Essentially the plugin
retrieves the IP addresses of your visitors - it needs to if it is going
to block a hacker. This advanced settings tab allows you to define
the method the plugin uses to retrieve those IP addresses. If you
find that IP addresses are not being retrieved properly, you can
switch to another method and test for reliability.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
You can also see it's a “Basic” security measure, so it's safe to
implement. At the moment, I've got a 0 score for this.
To change a display name, click the link of the username. The
system then takes you to the profile page of the user. This is
where you can select a different name in the Display name
publicly as section:
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
The display name options you have come from the fields:
username, first name, last name, and nickname.
Select a name and then click Update Profile .
When you go back to the User Accounts settings, Display Name
tab, you'll see 5/5:
Force Logout logs out an admin user after they've been in the
Dashboard for X minutes (60 minutes is the default). This can be
useful because if a hacker gets in by chance, the system logs them
out after the set period. If you don’t usually spend long in your
Dashboard, you can reduce the 60-minute limit still further. It's
handy because it reduces the time a hacker has to wreak havoc on
your site.
Remember, the system logs you out after this time too. If it
becomes a nuisance, you may want to leave the feature disabled.
If you do enable it, make sure you click the Save Settings button.
The Account Activity Logs screen displays the activity of
registered accounts in your Dashboard. It shows you the last 50
logins, with username, IP, and timestamp. You should be able to
recognize all of these users.
The final tab is the Logged in Users . It simply shows you the users
logged into your Dashboard right now. You can see the login name
and IP address. It's for information only.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
You can also enable a Captcha on the user registration form. This
helps to cut down on automated bot registrations. To activate the
Captcha (another basic setting), click on the Registration Captcha
tab. Check the box to Enable Captcha on Registration Page :
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
The other tab on the Database Security settings has the tools for
backing up the database. At the top, you can see an option to
manually back up the database:
Once you've corrected permissions on your site, click the PHP File
Editing tab.
When a hacker breaks into your Dashboard, one of the first places
they go is the PHP file editor. With this tool, they can hack into the
plugin and theme files. They can then change them or inject
malicious code into the files.
A simple way to prevent this is to disable the PHP editor. If you —
as a webmaster — want to edit the PHP files at any time, you still
can. All you do is access the files via FTP or File Manager in cPanel,
so it’s no big deal.
This is a “Basic” security measure, so it's safe to do now.
Simply check the box to Disable Ability to Edit PHP Files and click
Save Settings.
Now click on the WP File Access tab. This tab allows you to hide
other files that a hacker might use to gain information about your
site.
Again, it's a “Basic” security measure and, therefore, safe to
implement right away.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
The plugin can block specific IP addresses, but that's not all. The
Country Blocking Addon allows you to block entire countries if you
need to. That plugin is a paid upgrade, though, and I don't cover it
in this book.
You'll also notice that this security feature is an “Advanced” one.
You need to use it with some caution. I recommend you activate
this at a later date once you're sure everything else is working fine.
If you misuse this feature, you could find yourself locked out of
your site.
To activate the blacklist, check the Enable IP or User Agent
Blacklisting box.
You can now enter the IP address(es) you want to block. You can
use a wildcard to specify a range, e.g., 31.184.238.* This blocks
out all IP addresses that start with 31.184.238.
You can also enter full IP addresses:
When you enter a new IP address, make sure you put each one on a
separate line.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
You can also block user agents. This includes all kinds of bots that
roam the internet, e.g., baiduspider, SurveyBot, and so on.
Chapter 17 – Firewall
We activated the basic firewall when we first installed the plugin.
There're a lot more firewall settings you can activate. Some are
Basic, and others are Intermediate or Advanced. Let’s go through
each of these.
Click on the Firewall menu in the left sidebar.
You’ll see the firewall screen has a few tabs across the top. For
now, you should be on the Basic Firewall Rules tab.
At the top, you can see the basic firewall enabled (we did that
earlier).
Below this is another “Basic” feature:
Point to note: Before you activate this feature, you need to read a
little further.
The first option is to Completely Block Access to XMLRPC . The
thing is, you may need XMLRPC functionality, so disabling it could
cause you problems. On the other side of the coin, XMLRPC is a
common gateway for hackers. If you're not using it, I suggest you
disable it.
Example: I use Open Live Writer (previously Windows Live Writer)
to manage my blog content. It’s a tool I use for writing content
offline. When I'm ready, I then publish the post direct from within
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
The final feature on the basic firewall rules tab is Block Access to
Debug Log File .
This is an “Intermediate” feature that prevents access to a debug
log file. This file can contain sensitive information, so I recommend
you eventually enable it.
When you're done with the basic rules, click on the Additional
Firewall Rules tab.
These features are all “Intermediate” or “Advanced.” I suggest you
come back and activate these once you're sure your basic settings
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
The next option lets you disable trace and track. This will prevent
what’s called an HTTP Trace attack.
I recommend you enable it—eventually—but it's an “Advanced”
security measure, so leave it for the time being.
Next up is another “Advanced” option, but it's an important one
that helps to cut down on spam. The Proxy Comment Posting
option allows you to block comments coming in from a proxy server
(used by people trying to hide their true IP address). I recommend
you enable this option—eventually.
The next option is Bad Query Strings . You need to be careful with
this one, though. Activating it may cause conflicts with certain
plugins or themes. Make sure you backup your .htaccess file before
you implement it. This way, you can quickly revert if there's an
issue.
The final option on this screen is the Advanced Character String
Filter . This feature can help prevent Cross-Site Scripting attacks
(XSS). Once again, it's an “advanced” feature and can break your
site. Take a backup of your .htaccess file before you implement it.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Don’t bother with the 5G. That's an older form of protection that
the 6G firewall has since replaced.
The next tab in the Firewall settings is the Internet Bots tab.
This is an “Advanced” feature that aims to block malicious bots
masquerading as Googlebot:
OK, now save your settings and move onto the Prevent Hotlinks
tab.
If you have images on your site, each one will have its own URL.
Anyone can grab the URLs of your images and embed them into
their own site. It's a problem not least because YOUR server serves
the image wherever they are. So, every time the rogue site loads
one of your stolen images, it uses YOUR bandwidth.
For this reason, I recommend you activate this “Basic” feature:
Here you get the option for a temporary block or to blacklist the IP
address.
The final tab on the Firewall screen is for Custom Rules .
This is for anyone who wants to add custom rules to the .htaccess
file. These advanced techniques are beyond the scope of this book
and can easily break a site.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Read the warning box at the top, and click the link to read the
message. If your web host uses server caching, this feature could
easily break your site.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
At the top of the screen, you'll see confirmation that your new
login page is ready, and you’ll see the URL. It should look
something like the one below:
http://mysite.com/?mysecretword=1
You MUST copy and save that URL to a safe place. If you lose it, you
won’t be able to log into your Dashboard.
The way the protection works is to write a cookie to your computer
when you visit that URL. That URL then redirects you to your login
page. But if the cookie's not on your computer, you won’t be able
to log in, not even with the correct username and password.
Imagine a hacker comes to your login page. Even if they know your
username and password, they still can't access your site if they
haven’t visited your secret URL first to pick up the cookie. That's
pretty cool.
The next tab on the Brute Force settings is the Login Captcha
screen.
You’ll find three “Basic” features on this screen that you can
activate if you want.
These put a captcha on the login form, custom login form, and lost
password form, respectively.
Captchas can help reduce brute force attacks because logins
require a mathematical problem to be solved.
Check all three boxes and save the settings.
The next tab is the Login Whitelist screen.
This screen lets you specify which IP addresses (or range of
addresses) you allow logging into your Dashboard. If you use this
feature, it'll block all other unspecified IP addresses. It's an
“Intermediate” feature, so use it with caution. It works by writing
directly to your .htaccess file, so back that up before you enable
it.
I don’t use this feature, and nor do I recommend you use it either
unless you know what you're doing.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
The last tab in the Brute Force settings is the Honeypot . This is a
clever protection method that shows a hidden “honeypot” field on
the login page to all bots. Human visitors don't see it, but bots do.
They then fill in the “honeypot” field, and the plugin knows it's a
bot.
This is an “Intermediate” measure, but I do recommend you enable
it—eventually.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Once saved, your comment form will have something like this
above the Post Comment button:
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
This means a human will need to enter the answer for the
comment to arrive in your pending list.
On the Comment Spam settings, there is also the option to Block
Spambots from Posting Comments . Spambots are pieces of
software that allow mass submission of comments to hundreds or
thousands of sites in a very short space of time. This plugin can
tell if it's a spambot trying to post because, unlike a real visitor,
the request to post a comment won’t originate from your domain.
We can, therefore, block spambots from posting by checking the
Block Spambots from Posting Comments checkbox.
Save settings before continuing.
The second tab on the SPAM Prevention settings is the Comment
SPAM IP Monitoring settings.
When spam comments get into your site, you can approve them,
send them to trash, or mark them as spam (get familiar with spam
comments).
The Spam option is the one you should use. Together with this
plugin, comments marked as spam can trigger an automatic block
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Chapter 20 – Scanner
When a hacker breaks into your site, they’ll usually change one or
more files on your server. A typical hack would involve injecting
malicious code into these files. If successful, they can then use
your site for their evil purposes.
Auto email notifications are a great way to catch hackers early on
if any files on your server change unexpectedly. In general,
WordPress core files, plugin files, and theme files don't change too
often. PHP files and JavaScript files are the prime targets of most
hackers.
Our plugin can monitor these files and notify you right away if
something changes. You’ll know if it was you who made the
changes the last time you were in your Dashboard. If not, it'll be
something or someone more sinister.
The first step to monitoring files is to carry out an initial scan. The
plugin can then compare files in the future based on the scan date.
At the top of the options screen, click Perform Scan Now in the
Manual File Change Detection Scan .
Under the manual scan is a button that allows you to see files that
have changed since the last scan. There won’t be anything to see
yet as we're just setting it up.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
The next panel on this screen is the real workhorse. It carries out
automated checks at predefined intervals. This is an
“Intermediate” feature, though. Only activate it once you know
your basic protection is working fine.
When you're ready, check the Enable Automated File Change
Detection Scan box.
The default scan frequency is four weeks. The interval you choose
determines how long hackers have before the system notifies you.
A scan interval of four weeks means it could be four weeks before
you find out about any changes.
Note that these scans do take up server resources. Therefore,
don’t do anything like scan every hour. That's UNLESS you think a
hacker is attempting to break into your site, and you want to
monitor the situation.
I tend to stick to a 2 – 4-week scan interval on my sites.
You can also set the scan up to ignore certain file types. For
example, if you post a lot of images, it's wise to ignore the image
file formats you use:
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
You can get the scan to ignore files or directories as well. If you
know where your log files are, or their names, you can exclude
those. Similarly, you might want to ignore any caching folder if
these are just cached copies of your web pages.
Enter the address you want to use for auto email notifications at
the bottom of the screen. Click Save Changes .
The Malware Scan tab is information about malware and links to
tools you can use to scan for malware on your site. There are no
settings on this screen.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Chapter 21 – Maintenance
When you want to lock visitors out of your site for any length of
time, you can put your site into Maintenance Mode . We touched
on this earlier when we first looked at the plugin’s Dashboard.
The Maintenance screen gives you some Visitor Lockout options.
The Enable Front-End Lockout checkbox will turn maintenance
mode on. Visitors will see a message to say that your site is not live
right now. The content of the Enter a Message box determines the
exact message they will see, and you can customize this.
The default message simply states the site is not available and to
try again later. You can change this message to read whatever you
like. The editor for this is a full WYSIWYG, so you can control the
format and even include images, and links, etc.
If you do change the default message, make sure you save the
settings before proceeding. Also, make sure you have Enable Font-
end Lockout DISABLED unless you want it enabled right now.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Chapter 22 – Miscellaneous
The final settings for this plugin are grouped in the Miscellaneous
screen.
There are four tabs.
The first one is the Copy Protection tab . This prevents people
from right-clicking on your web pages. It's useful because they can't
get the right-click popup menu to inspect (and steal) your web
page content. It also stops people from highlighting blocks of text
on your page, so it makes copying your content more difficult.
This feature won’t stop a determined hacker. It will certainly deter
some common thieves, though, who simply want to steal your
content.
Check the Enable Copy Protection box, and save the settings.
On the Frames tab, there is an option to stop other people from
putting your web pages into a frame on their website. This type of
technique allows them to trick visitors into thinking they're actually
on your site. Needless to say, this is a practice that can be quite
damaging to you.
To prevent this, check the Enable iFrame Protection box, and save
settings.
The Users Enumeration tab has one option. Disable Users
Enumeration will prevent hackers (or bots) from accessing useful
“hacking info.”
Check the box and save the settings.
The final tab is the WP REST API. Since some plugins use the REST
API, I recommend you leave this feature disabled.
OK, that's the plugin all set up. Your site is now really well-
protected.
Go back and check your Security score. Your results will depend on
which features you have activated. Here's how mine looks now:
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
I've achieved this score after activating all basic and a few
“Intermediate” features. Don't worry right now if your score's a lot
less. It'll increase as you go in and activate more features over
time.
After testing the current security settings, I still have a few other
features to activate, so my score will go up.
Notice the above image on the right. When we first began to
activate the plugin, that pie chart looked like the one below:
2. Scanner Menu
¨ On the File Change Detection tab, Perform Scan Now to
check if any files are different from the default installation
files. You may find that the .htaccess file has changed, but
that's usually fine.
¨ Check the option to Enable Automated File Change
Detection Scan .
3. Settings Menu
¨ Backup your Database
¨ Backup your .htaccess file
¨ Backup your wp-config.php
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
¨ Click on the WP version Info tab across the top and check
the Remove WP Generator Meta box.
Setting up Security
Database Security
¨ On the DB Prefix tab, make sure you're not using the
default wp_ as your table prefix.
¨ On the DB Backup tab, enable automated backups.
Filesystem Security
¨ On the File Permissions tab, if there are any
Recommended Actions , take them.
¨ On the PHP File Editing tab, Disable the ability to edit PHP
Files .
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Firewall
¨ On the Basic Firewall Rules tab, Enable Basic Firewall
Protection .
¨ If you are not using XMLRPC, you can block it completely;
however, I don't recommend this as some plugins will use it.
¨ Enable the Block Access to debug.log file .
¨ On the Additional Firewall Rules tab, enable Disable Index
Views.
¨ Enable the Disable Trace and Track .
¨ Enable Forbid Proxy Comment Posting .
¨ Enable Deny Bad Query Strings .
¨ Enable the Enable Advanced Character String Filter .
¨ On the 6G Blacklist Firewall Rules tab, check the Enable
6G Firewall Protection option.
¨ On the Internet Bots tab, enable the option to Block Fake
Googlebots .
¨ On the Prevent Hotlinks tab, enable the option to Prevent
Image Hotlinking .
¨ On the 404 Detection tab, check the option to Enable 404
IP Detection and Lockout .
Brute Force
¨ On the Cookie Based Brute Force Prevention , perform the
cookie test to make sure your site can use this method of
protection. If it can, enter a Secret Word and then Enable
Brute Force Attack Prevention on this tab. If it cannot, go
to the Rename Login Page tab and use that instead.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
SPAM Prevention
¨ On the Comment Spam tab, check the option to Enable
Captcha On Comment Forms .
¨ Check the option to Block Spambots from posting
comments .
¨ On the Comment SPAM IP Monitoring tab, check the option
to Enable Auto Block of SPAM Comment IPs . I recommend
you enter a low number into the Minimum number of SPAM
comments box. I use 1.
Miscellaneous
¨ On the Copy Protection tab, check the option to Enable
Copy Protection .
¨ On the Frames tab, check the option to Enable iFrame
Protection .
¨ On the Users Enumeration tab, check the option to Disable
Users Enumeration .
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
https://www.wordfence.com/blog/2018/04/is-wordpress-secure/
https://en-gb.wordpress.org/about/security/
https://www.wordfence.com/learn/introduction-to-WordPress-
security/
https://sucuri.net/guides/wordpress-security/
https://premium.wpmudev.org/blog/keeping-WordPress-secure-
the-ultimate-guide/
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
YouTube Channel
Lots of video tutorials on using WordPress.
http://ezseonews.com/yt
My Site / Newsletter
Find lots of WordPress tutorials. You can sign up for my newsletter
while you are there to get notified of new tutorials, books,
courses, etc.
https://ezseonews.com/
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Useful Resources
There are a few places that I would recommend you visit for more
information.
My Video Courses
I have a growing number of video courses hosted on Udemy. You
can view a complete list of these at my site:
https://ezseonews.com/udemy
There are courses on the same kinds of topics that my books cover,
so SEO, Content Creation, WordPress, Website Analytics, etc.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
WordPress Glossary
This glossary lists some of the technical terms I’ve used in this
book. You may also hear these terms when watching other videos
or tutorials online. Don't let this list scare you. You do not need to
know all of these. This list is for reference only. As you go through
this book, if you hear a word you don't understand, look here.
Administrator / Admin - The person that is responsible for
maintaining the website, adding pages, etc.
Category Silo - A silo is a closely related group of posts that link to
each other but not to less related posts. For example, you might
have a category on your site about mountain bikes. All posts in
that category are about mountain bikes and link to other articles
on mountain bikes. Categories in WordPress allow you to group
posts into these silos, so you might hear the term category silo,
simply meaning a group of highly related posts, all in the same
category.
cPanel - This is your web host control panel that provides an easy-
to-use interface and automation tools to simplify your job as site
admin.
Child Theme - This is a WordPress theme that inherits its
functionality from a parent theme. The parent theme needs to be
installed as well as the child theme. Changes made to the child
theme won't affect the parent theme so that you can update the
parent theme as and when updates are available without trashing
your site.
CSS - The layout and design of a web page and its contents are
controlled by CSS. This stands for Cascading Style Sheets. You can
change colors, font size, alignment of text or images, etc., all
using CSS.
Database - A database is a file that contains information.
WordPress stores your site content and settings in the database.
Dashboard - This is the WordPress control panel, where you log in
to add/edit your website.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr
Web Host - This is the company that rents you disk space on their
computers (servers). You can use that disk space to install your
website. When someone visits your website, it's delivered from
that web host. The web host has a unique DNS that you give to
your registrar.
Webmaster - Same as administrator.
wp-config.php - This file contains the basic setup information for
your WordPress site, like database name and other database
settings.
Widgets - These are plug-and-play pieces of software that can add
features to various areas of your website. e.g., there is a widget
that displays a calendar, and this could be placed in the sidebar.
https://t.me/bookzillaaa - https://t.me/ThDrksdHckr