Book Image

WordPress 3 Ultimate Security

Book Image

WordPress 3 Ultimate Security

Overview of this book

Most likely – today – some hacker tried to crack your WordPress site, its data and content – maybe once but, with automated tools, very likely dozens or hundreds of times. There's no silver bullet but if you want to cut the odds of a successful attack from practically inevitable to practically zero, read this book. WordPress 3 Ultimate Security shows you how to hack your site before someone else does. You'll uncover its weaknesses before sealing them off, securing your content and your day-to-day local-to-remote editorial process. This is more than some "10 Tips ..." guide. It's ultimate protection – because that's what you need. Survey your network, using the insight from this book to scan for and seal the holes before galvanizing the network with a rack of cool tools. Solid! The WordPress platform is only as safe as the weakest network link, administrator discipline, and your security knowledge. We'll cover the bases, underpinning your working process from any location, containing content, locking down the platform, your web files, the database, and the server. With that done, your ongoing security is infinitely more manageable. Covering deep-set security yet enjoyable to read, WordPress 3 Ultimate Security will multiply your understanding and fortify your site.
Table of Contents (23 chapters)
WordPress 3 Ultimate Security
Credits
About the Author
Acknowledgement
About the Reviewers
www.PacktPub.com
Preface
Index

The almost perfect anti-malware solution


To repeat an important theme, there is no silver bullet. There is no 100% guarantee. There is no perfect solution. There is no one-size-fits-all. Then again, let's try.

Give or take, what do we need?

  • A two-way firewall to check incoming and outgoing traffic

  • An old-school antivirus to seek out known threats

  • A HIPS scanner to sniff out new threats

  • A behavioral scanner to sniff out new threats

  • A sandbox to run untrusted applications or for risky web activity

  • Plus maybe a virtual machine if we're somehow upping the risk factor

  • And last but not least, a dollop of good old-fashioned common sense

Quite a list.

Many folks use either a HIPS or a behavioral scanner. I use both for Windows systems, plus a VM for advanced sandboxing, for pentesting systems, and so on. Call me reckless! You, maybe, have a very conservative use of your PC, never touching torrents for example, and could maybe ditch the sandbox or the VM. Two words though ... zero day.

Let's take this list...