There are a number of interesting attacks out there, and one of them is related to Genericons, which are used by the Twenty Fourteen theme. There are also serious performance issues with Genericons, so dumping them is a good idea. Here is how I did that without using a child theme. My whole goal for using Twenty Fourteen was to modify it without using a child theme. Not that hard to do, but it does take some forethought. Here is how I achieved this bit of magic and boosted performance at the same time!
In WordPress Hacked: Security Steps Take II, I wrote about the tools and steps to take to secure your WordPress installation. The current steps to take are the same. The tools, however, have changed significantly. Even as the steps changed from WordPress Hacked: Security Steps, now we look at the tools once more. I will reiterate the steps at the end of the post for completeness. However, let us begin by examining the tools. I have removed quite a few from my installs that I had previously recommended, and I will explain why below. Continue reading WordPress Hacked: Security Steps and Cleanup Take III
I have written about upgrading VMware vCenter Log Insight (vLI) in the past, but I have not discussed my first content pak for Log Insight. You can find my discussion on how to set up this content pak below. This was recorded at VMworld 2014 by the vBrownBag folks. I would like to thank them for their effort and for allowing me to speak on this subject. Continue reading vSphere Upgrade Saga: Log Insight Content Pak
I’m tired of moving spam mail to spam folders from which the system never learns. So it’s time for me to try a new approach.
It has been a year since I wrote WordPress Hacked: Security Steps and there are now some new plugins and tools to help with security of your WordPress site. The steps to take to find hacks are the same as the security steps previously mentioned, but there are some new tools and services that may make your life easier and alleviate more attacks. So here is an updated set of rules, plugins, and actions to take. I suggest Reading the original post as a part of this one. Continue reading WordPress Hacked: Security Steps Take II
I recently upgraded my 2 generation old Mac Book Pro to a new Retina Mac Book Pro and inadvertently found a way to increase security of the device. I thought it was originally a bug, but after discussing with several Apple Technicians, what I did, while inadvertently is by design. In essence, I added a secondary login screen to my Retina Mac Book Pro with each requiring a different set of credentials. But how did this happen and is it worth the extra layer of protection? Continue reading Retina MacBook Pro with Extra Security