Wordpress - Security Tips - How to outsmart hackers: A step-by-step guide by PERSON Thomas

Wordpress - Security Tips - How to outsmart hackers: A step-by-step guide by PERSON Thomas

Author:PERSON, Thomas [PERSON, Thomas]
Language: eng
Format: azw3, mobi, epub
Published: 2020-07-27T16:00:00+00:00


copy and paste it into the settings of your CloudFlare plugin.

In the configuration of your CloudFlare plugin, you'll have to set the "Automatic Cache Management" parameter to "On".

As explained earlier, this setting is important because as soon as you add/modify/delete content, the CloudFlare "cache" (i.e. its internal copy of your website that it uses to respond quickly to users) will be deleted and recreated, so that there is no difference between the copy served by CloudFlare to users and your website.

Number 9: Get your site to HTTPS with CloudFlare

HTTPS (for Hypertext Transfer Protocol Secure) is the secure version of the HTTP protocol. By using the HTTPS protocol, the data exchanged between the browser and the website becomes encrypted, making it unreadable any data intercepted by a hacker.

To use a comparison with mail sent by post: a neighbour can easily intercept your mail (by forcing your mailbox or pretending to be you with a replacement postman), read your mail, put it back in the envelope, and put the envelope in your mailbox. You'll never know that your neighbor read your mail. If your mail was sent using HTTPS, the contents of the envelope would be incomprehensible to your neighbor, because it would be encrypted knowing that only you have the decryption key.

This is why the HTTPS protocol is mainly used by e-commerce and banking sites. The objective is to guarantee the customers of these sites the protection of their personal data, such as their access identifiers or their credit card number. All sites that support financial transactions have long since adopted this security protocol.

HTTPS helps make your site safer for visitors to your site. That is his main interest. By using HTTPS, you limit the risks that a malicious person will intercept the data transmitted by the Internet user on your website and more generally all information transmitted between the browser and the server of your site.

You could say to yourself that since your site is a blog for the public, without an online payment system, the switch to HTTPS does not concern you. It is not. Indeed, the HTTP protocol has certainly enabled the development of the Web, but it is very vulnerable. Indeed, it allows anyone who controls the network you use (Wifi from hotels, Internet cafes, co-working spaces and of course your Internet service provider) to modify the content of the http sites you consult, without you being aware of it.

As Troy Hunt, security analyst at Microsoft, reminds us, here are some examples of possible threats to HTTP sites:

Inserting advertisements (or other content) that are not on the original website

Injecting invisible software that undermines crypto-money with your pc for the benefit of a third party (for the record the mining of crypto-money makes money), as practiced by a Starbucks store in Argentina in 2017 via the wifi access it provided to their customers

Redirect visitors to fake websites (being a carbon copy of the original site) with a technique called DNS hijacking. The user who thinks he is on



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.