Les nouveautés et Tutoriels de Votre Codeur | SEO | Création de site web | Création de logiciel

Seo Master present to you:

How to recover your hacked WordPress blog or website 



                                      recover hacked Wordpress blog

WordPress is one of the most popular content management systems at present. and at same time it is Most targeted as well. so today i will teach you some tips and Methods on how to patch/recover your site when your website is hacked (which is hosted on WP) and this post is also for those who want to keep there WordPress sites safe.


How to recover Hacked Wordpress website 

if your WP website is attacked then follow these steps and get your site back.

Backup - if your website is infected to a small extent then it is still much necessary for you to secure the backup of your website before waiting to see your things changing to worse.you can use Plugin called BackupBuddy for this purpose but, i advice you to use UpdraftPlus Backup because it is free plugin and best alternate of Backupbuddy.

Change Login Details and Secret Access Keys – at the time you feel or see that your site is defaced then immediately check whether your login details are changed or not because some hackers didnt change login details in hurry. so if hacker did'nt changed your login details then quicky change login details and Wp-config secret access keys too.

Running scanners - The scanner are basically used to identify compromises at database level You can try out Cloud Sites WP Scanner plug-in or Sucuri Malware Scanner. After running the scanner you can proceed to next step.


                                                 recover hacked Wordpress website


Installing Your WordPress Again – Next important step involves Deleting all the files existing in the directory of WordPress except wp-config.php file and wp-content directory. After that you need to download and install a totally fresh copy of WordPress.

Review content folder - check all the folders in wp-content directory if you feel some folder does'nt belong to your site or seems sespicious then remove it , dont worry if you mistakenly removed any folder which is part of your blog and is not suspicious then you can get it back through backup files after even removing.

Review Plug-ins - Now this is time to analyza all your plug-ins simply remove all plug-ins from your Panel which you did'nt use and other plug-ins which you need should be uninstalled and INSTALLED again for security purposes.

Check your .htaccess file for hacks-  Hackers can use your .htaccess to redirect to malicious sites from your URL. Look in the base folder for your site, not just your blog's folder. Hackers will try to hide their code at the bottom of the file, so scroll down. They may also change the permissions of the .htaccess file to stop newbies from editing the file. Change the permissions back to 644.

Now analyze your theme- 
 task of removing the extra themes which are not in use currently. Next task again involves reviewing your activated theme. Look through the PHP or Javascript code to find out any suspicious activity there. Most of the time hackers make such malicious changes in header.php or footer.php files.
2013, By: Seo Master
Seo Master present to you:

You might have thought that cloud computing would never catch on, but it's definitely here to stay. Latest market forecasts are predicting a 30% annual growth for the industry, so if you haven't paid attention before, now's the time to start.

People all over the world are flocking to use technology to store data in a virtual space, but cloud computing isn't just for data. You can also use it to run applications and software remotely, so you don't need to be chained to your office PC.

If you're a small business that needs more IT expertise than your current employees can provide then outsourcing your IT to a cloud company could be the ideal solution. It might be slightly more expensive than hiring an in-house IT expert, but the pros definitely outweigh the cons. Cloud services will increase your efficiency and mean that your small business can take a "big business approach" to any issues you face.

Are there different types of cloud service?

Put simply, yes, there are three levels of cloud service.

First level: Infrastructure as a Service (IaaS).
It provides virtual hardware such as computers, storage software platforms etc. This means that your employees can access everything they need via the internet, rather than being office based.

Second level: Platform as a Service (PaaS).
It provides all the resources a small business would need to create its own software and programmes. This will usually include an operating system, programming environment, database and web server. Useful if you're looking to reduce costs.

Third level: Software as a Service (SaaS).
This provides you with programmes and software that are ready to go. You can run them remotely, there are no lengthy installation times and no concerns about whether your hardware will cope.

What could go wrong?

Nothing is risk free and here are some of the potential pitfalls explained.

Data security
This is the most obvious concern that most people have, but in most cases, if you use a reputable supplier, your data is safe. When you combine a specialist cloud provider with an in-house expert your security will be better than most small businesses can normally manage.

Information control
Your information is stored on someone else's computer, and you'll have no idea where that is. You should be aware of all the contractual terms of your cloud supplier to make sure you comply with your legal, contractual and moral obligations.

Flexibility
At the moment it isn't possible to "pick and mix" cloud services like you would with internet providers. You could find it difficult to change cloud services and if you use more than one cloud service it could be hard to make them work together.

How do I choose a provider?

Ask yourself these three quick questions:
  1. Is the provider stable, trustworthy and have a good reputation to lose?
  2. Do the conditions of the contract work for your business?
  3. Will this provider really benefit your business?
Trust your instincts, finding the right IT support is tricky whether you're in London or Lewes. Be sure to look before you leap, but don't be afraid to take the plunge.



Author Bio:
Rob Rudd enjoys his job as a writer and regularly contributes to several IT and technology blogs. When he isn't writing he enjoys learning to play the ukulele.
2013, By: Seo Master
Seo Master present to you: If you use Google Code's open source project hosting service, you're probably already familiar with the standard features: the issue tracker, the wiki, the downloads-area, and the browseable version-control repository.

But the project hosting service is also full of cool bells and whistles that you may not have noticed before. We've compiled a fun list of these things which you can show off at your next, um, project hackathon. In this first post, we'll look at some version control gems.

Web-based Code Reviews

  • What: browse a committed change, then make comments right in the browser.
  • Example: here's a brief sample review of a changeset.
  • How to do it: Bring up a changeset in the source browser and click the "start a code review" link in the right-side bubble. Double-click on lines of code to enter comments, then click "publish your comments" when done. An email will be sent to the changeset author, and then they can reply to the comments through the same web interface.

Make Stuff Happen after a Commit

  • What: after a commit, you can automatically fire off a continuous build, make an IRC bot speak... even notify an AppEngine instance!
  • How to do it: Look for the "web hooks" section in the Administer->Source page. If you provide a URL to your server, we'll ping it with commit information after every code change. Follow the links for full details and documentation.


Descriptive Wiki Commit Logs

  • What: The wiki is stored in version control; when saving a wiki page, use a more descriptive commit message than the default "Edited wiki page through web user interface".
  • Example: Here's a wiki change with a useful description.
  • How to do it: When editing a wiki page, expand and fill out the "Commit Log" textfield.

Of course, one of the most exciting new features on our project hosting service is our nascent support for the Mercurial distributed version control system. If you're coming to Google I/O, be sure to come hear our talk about Mercurial on Bigtable!

2013, By: Seo Master
Powered by Blogger.