Book Image

WordPress 3 Ultimate Security

Book Image

WordPress 3 Ultimate Security

Overview of this book

Most likely – today – some hacker tried to crack your WordPress site, its data and content – maybe once but, with automated tools, very likely dozens or hundreds of times. There's no silver bullet but if you want to cut the odds of a successful attack from practically inevitable to practically zero, read this book. WordPress 3 Ultimate Security shows you how to hack your site before someone else does. You'll uncover its weaknesses before sealing them off, securing your content and your day-to-day local-to-remote editorial process. This is more than some "10 Tips ..." guide. It's ultimate protection – because that's what you need. Survey your network, using the insight from this book to scan for and seal the holes before galvanizing the network with a rack of cool tools. Solid! The WordPress platform is only as safe as the weakest network link, administrator discipline, and your security knowledge. We'll cover the bases, underpinning your working process from any location, containing content, locking down the platform, your web files, the database, and the server. With that done, your ongoing security is infinitely more manageable. Covering deep-set security yet enjoyable to read, WordPress 3 Ultimate Security will multiply your understanding and fortify your site.
Table of Contents (23 chapters)
WordPress 3 Ultimate Security
Credits
About the Author
Acknowledgement
About the Reviewers
www.PacktPub.com
Preface
Index

Repositories, packages, and integrity


Packages and their patches are pooled in software hubs called repositories and the main Linux repos, thanks to a well-honed system, can be considered safe and secure.

Note

Your /etc/apt/sources.list catalogues the repositories your system fetches from, with notes for each, so take a look.

Some packages, though, may not be available from official repositories, else take months for updates to trickle through, so we can add extra locations to our sources.list. The thing to bear in mind is that not every repository is maintained as well as those for the official Linux distributions. Servers can be compromised, as can packages.

From non-mainstream repositories, therefore, as well as for any compressed packages to be compiled from source, it's important to check our downloads.

Verifying genuine software

The two most common ways to ensure the integrity and authentication of downloads are MD5 checksums and GnuPG signatures. The latter is the preferred, safer method...