How to secure WP in 3 easy steps:

  1. Build an underground bunker from reinforced concrete in a hidden unknown location, using hand tools under camouflage netting.

  2. Hire single ex-USMC drill sergeants and dog handlers, with their mutts, and arm them to the teeth. Tell them that the ragheads have announced their intention to destroy the place, and pay them well.

  3. Put the server in a locked rack inside the bunker; then, using a sharp axe, sever all cabling from the back of the unit. Be sure and wear gloves for this step.

Presto! Secure WordPress in 3 easy steps.

    I would disagree with step 2 being "easy". I can't afford to pay someone, let alone pay them well!

      Derokorian;11045621 wrote:

      I would disagree with step 2 being "easy". I can't afford to pay someone, let alone pay them well!

      Yeah, I saw this on LinkedIn actually, so maybe it's aimed more at CTO/CIO/CEO types 😉

        I guess that step 2 is easy if you have the money and the right connections 😃

          1. Build your own blog system with PHP on Laravel.
          2. Have all your views and routes defined to look like WordPress pages and URLs.
          3. Grab a beer, put your feet up, and watch script kiddies try WP hacks on your site.
            NogDog;11045675 wrote:

            1. Build your own blog system with PHP on Laravel.
            2. Have all your views and routes defined to look like WordPress pages and URLs.
            3. Grab a beer, put your feet up, and watch script kiddies try WP hacks on your site.

            HA! My site doesn't even resemble WP and I get lots of access logs showing they are trying to access wp_admin and such.

              NogDog;11045675 wrote:

              1. Build your own blog system with PHP on Laravel.
              2. Have all your views and routes defined to look like WordPress pages and URLs.
              3. Grab a beer, put your feet up, and watch script kiddies try WP hacks on your site.

              😃

              1. Have your site collect their IP addies and respond with "ping -f" 😉
                Write a Reply...