Wordpress - Security Tips - How to outsmart hackers: A step-by-step guide by PERSON Thomas
Author:PERSON, Thomas [PERSON, Thomas]
Language: eng
Format: azw3, mobi, epub
Published: 2020-07-27T16:00:00+00:00
copy and paste it into the settings of your CloudFlare plugin.
In the configuration of your CloudFlare plugin, you'll have to set the "Automatic Cache Management" parameter to "On".
As explained earlier, this setting is important because as soon as you add/modify/delete content, the CloudFlare "cache" (i.e. its internal copy of your website that it uses to respond quickly to users) will be deleted and recreated, so that there is no difference between the copy served by CloudFlare to users and your website.
Number 9: Get your site to HTTPS with CloudFlare
HTTPS (for Hypertext Transfer Protocol Secure) is the secure version of the HTTP protocol. By using the HTTPS protocol, the data exchanged between the browser and the website becomes encrypted, making it unreadable any data intercepted by a hacker.
To use a comparison with mail sent by post: a neighbour can easily intercept your mail (by forcing your mailbox or pretending to be you with a replacement postman), read your mail, put it back in the envelope, and put the envelope in your mailbox. You'll never know that your neighbor read your mail. If your mail was sent using HTTPS, the contents of the envelope would be incomprehensible to your neighbor, because it would be encrypted knowing that only you have the decryption key.
This is why the HTTPS protocol is mainly used by e-commerce and banking sites. The objective is to guarantee the customers of these sites the protection of their personal data, such as their access identifiers or their credit card number. All sites that support financial transactions have long since adopted this security protocol.
HTTPS helps make your site safer for visitors to your site. That is his main interest. By using HTTPS, you limit the risks that a malicious person will intercept the data transmitted by the Internet user on your website and more generally all information transmitted between the browser and the server of your site.
You could say to yourself that since your site is a blog for the public, without an online payment system, the switch to HTTPS does not concern you. It is not. Indeed, the HTTP protocol has certainly enabled the development of the Web, but it is very vulnerable. Indeed, it allows anyone who controls the network you use (Wifi from hotels, Internet cafes, co-working spaces and of course your Internet service provider) to modify the content of the http sites you consult, without you being aware of it.
As Troy Hunt, security analyst at Microsoft, reminds us, here are some examples of possible threats to HTTP sites:
Inserting advertisements (or other content) that are not on the original website
Injecting invisible software that undermines crypto-money with your pc for the benefit of a third party (for the record the mining of crypto-money makes money), as practiced by a Starbucks store in Argentina in 2017 via the wifi access it provided to their customers
Redirect visitors to fake websites (being a carbon copy of the original site) with a technique called DNS hijacking. The user who thinks he is on
Download
Wordpress - Security Tips - How to outsmart hackers: A step-by-step guide by PERSON Thomas.mobi
Wordpress - Security Tips - How to outsmart hackers: A step-by-step guide by PERSON Thomas.epub
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Whiskies Galore by Ian Buxton(40206)
Introduction to Aircraft Design (Cambridge Aerospace Series) by John P. Fielding(32315)
Small Unmanned Fixed-wing Aircraft Design by Andrew J. Keane Andras Sobester James P. Scanlan & András Sóbester & James P. Scanlan(32125)
Craft Beer for the Homebrewer by Michael Agnew(17430)
Turbulence by E. J. Noyes(7015)
The Complete Stick Figure Physics Tutorials by Allen Sarah(6619)
Kaplan MCAT General Chemistry Review by Kaplan(6034)
The Thirst by Nesbo Jo(5757)
Bad Blood by John Carreyrou(5743)
Learning SQL by Alan Beaulieu(5380)
Weapons of Math Destruction by Cathy O'Neil(5015)
Man-made Catastrophes and Risk Information Concealment by Dmitry Chernov & Didier Sornette(4703)
iGen by Jean M. Twenge(4685)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(4473)
Digital Minimalism by Cal Newport;(4459)
Audition by Ryu Murakami(4076)
1,001 ASVAB Practice Questions For Dummies by Powers Rod(4023)
Electronic Devices & Circuits by Jacob Millman & Christos C. Halkias(3989)
Pale Blue Dot by Carl Sagan(3974)