Photo by Mike_3D

A few weeks ago I had the unpleasant surprise of finding out that my blog got automatically hacked by spam bots, due to a Wordpress exploit, and in course also got infected with malware. Google, vigilant as always, was quick on scanning LOAB for any malicious software, found some corrupted code and immediately flagged the blog. What happened next was very predictable: who ever tried to search to for something on Google and found LOAB among the search results wasn’t able to access the blog, as it was “quarantined.” I lost hundreds of visitors daily during the course of two weeks, my rankings were shattered and of course the blog’s reputation was stained; as a side note I’d like to thank all the loyal readers that confidently continued to read my blog during that tough period.

So what basically happened was me, a innocent blogger, got hacked and unjustly suffered a great deal for nothing. And I’m not alone either, my horror story was shared by thousand of other bloggers all over the world, reporting almost the same “symptoms” as me. But was I entirely fault-less? Of course not, much of the blame of getting flagged by Google belonged to me, I’m as much responsible for it, as the devious persons behind the attack, just for letting something like this happen in the first place. Only after It was too late I realized I was never really ready for any similar situation, that could’ve happen to anyone at any time. I never took the necessary precautions and I got burned. Fortunately I got unbanned and all is well now, but it all could’ve been much worse. If there’s anything this nightmare’s taught is to be always prepared; so to spare some bloggers of sleepless nights and burnt neurons, I’ve decided to do a write up about protecting your blog against hacks. Note: this article is mainly aimed at Wordpress blogs.

Preventing Attacks on Your Blog

Blog Attacks
Photo by Elaine_Vigneault

Hackers, whether they’re human or automated scripts, to infiltrate you’re blog, must first find a breach, a hole in the system, which sadly can always be found in the Wordpress CMS. You can always count on finding various gaps to be exploited by hackers, trust me there’s no full-proof safe blogging CMS right now (doubt there’ll ever be), but some “holes” are much more common and easy to find then others and as consequence, must be immediately “plugged.” Bellow you can find a few solid tips, that can at least help avoid a tragedy. Some of these pointers may prove more or less technical, but I promise I’ll try to keep it all in layman’s terms as best as possible.

Securing Your Blogging Platform

Blogging Security
Photo by Micke-Fi

If you really want to keep your blog squeaky clean and pest free, then it’s for the best you start playing it safe from the very start, or in our case, since you first install Wordpress on the server. Here’s just a few quick tips I’ve learned over a lot of time and over even more failed Wordpress installs:

  1. Change your database table prefix. One of the most common types of hacking acts are those based on SQL injection, and 99% of time the whole process is automated. So you can spare yourself a lot of trouble, by trying to fool any potential intruders, just by changing your default Wordpress table prefix from “wp_” to something really unrelated like “sad213.” The reason why this will help a great deal is because there are thousands of treats all over the net, that will look for any vunerable databases that have table prefixes starting with “wp_” (provided they get the chance to scan your blog’s database). You should keep this in mind when installing any kind of popular CMS.
    Don’t use the ‘root’ user in any way. This is really really important, or else you’ll be risking a heck load. Think of it like this: you’ve let wordpress access the database via a root user, but you get hacked. Bummer, but this time, because you’ve been using the root user, all of your other websites on the server, if any, will be at great risk. Never happened to me, but if heard some pretty scary stuff…
  2. Change your default user name. When you install Wordpress the first user will be called “admin,” and much like the point above, this can be reason of some uninvited trouble. What you need to do is change the user name and you’ll have one less thing to worry about. If you try to edit your user name you’ll soon see that it’s not possible from within Wordpress, but only through altering the database. Login to your PhpMyAdmin and run the following line of code:tableprefix_users set user_login='newuser' where user_login='admin';

    Oh and more thing: please use a decent password! If you feel unsure on how to pick a secure password, check out this excellent article by Lorelle.

  3. Restrict access. When you installed wordpress on your domain for the first time, you were prompted to change CHMOD permission to various .php files and folders from “read” to “read/write.” What I’d recommend you do is write down all the folders and files you’ll be checking the permissions to and after you’ve successfully installed wordpress, revert the permissions. We could take restricting unauthorized access a step further by using .htacess to disallow any kind of access to the wp-content and wp-includes directories, besides some images, CSS and js files: Order Allow,Deny
    Deny from all
    <Files ~ “.(css|jpe?g|png|gif|js)$”>
    Allow from all

    If, God forbid, a certain attack is successful, then some of your .php files might become readable and among them is your highly important wp-config.php, from your root install. The wp-config file, as you may remember from when you first installed Wordpress, contains precious, private data concerning your database like the username and password. What we have to do, to make suer they don’t fall into the wrong hands, is restrict the access to the file via .htaccess procedure.

    <Files wp-config.php>
    Order Deny,Allow
    Deny from All
  4. Hack-proof your wp-admin directory.Your wp-admin directory, much like your wp-config.php file are both extremely valuable for the wellbeing of your blog, but unfortunately are also very vulnerable to attacks. What you need to do is to protect your wp-admin by adding a few more layers of security, which we’ll achieve through a series of .htaccess inputs and Wordpress plugins. A really great way to make sure 99% of your uninvited guests, that try to access your wp-admin file, get quickly ejected, is to disallow all other IPs, other then yours. Here’s the code to add to your .htaccess. Very Important: Do not add the following lines of code to your root blog address (/public_html), but in a new a .htaccess file, that you’ll have to create, in the wp-admin directory (/public_html/wp-admin).

    AuthUserFile /dev/null
    AuthUserFile /dev/null
    AuthGroupFile /dev/null
    AuthName “Access Control”
    AuthType Basic
    order deny,allow
    deny from all
    # whitelist home IP address
    allow from
    # whitelist work IP address
    allow from
    allow from

    This can be pretty stressful if your ISP assigns you a dinamic IP address, that changes with each PC reboot or if you try to access your wp-admin from a remote address. It certainly does its job well nevertheless. However there’s little this little hack can do when faced with a brute force attacks; but here’s where the Login Lockdown plugin comes in. What the plugin does is it logs all failed login attempts and after a set amount of failed logins, it blocks an IP range for 1 hour by default. Quite a nifty tool, but be careful though how you misspell your password.Another WP plugin that’s worth mentioning is the AskApache Password Protect, which, when enabled, will prompt anyone trying to access the wp-admin directory to fill in a username and password, assigned by you (which of course should be different from your wordpress login details). The plugin will automatically create a .htaccess and .htpasswd file, without messing anything up and will also automatically assign the appropriate file permissions.
  5. Hide your WP version information. Meta tags are a great way to let search engine robots better know what your content is all about and also help them read it better, but for spam bots they’re perfect for finding out your weaknesses. The following meta tag can be found in your header and will display your current WP version; look for it and delete it.
    <meta name="generator" content="WordPress <?php bloginfo('version'); ?>" /> <!-- leave this for stats please -->
  6. Hide your WP plugins. Some Wordpress plugins are very fragile to attacks and some are full with exploit holes, so naturally what you’d like to do is hide what plugins you’re using from everyone else, so that nobody’s aware of their existence. You can do this just by creating a simple empty index.html file like wp-content/plugins/index.html. That’s it!

Various Security Pointers

Various Security Tips
Photo by cobalt123

  1. Update, update, update! Virtually, outdated software is like a welcome mat for hackers, who are always on the prowl for such foolish victims, such as myself who felt to lazy to update my WP version from 2.2 to 2.3.3. That particular laziness took its toll. Don’t be a fool and always update your software and I’m not only talking here about Wordpress, but any kind of other auxiliary software as well, like plugins, that can prove to be quite damaging. Now , since the new WP 2.3 version, you’ll always get prompted whenever a new plugin version is available for download, so in a few quick minutes you’ll be able to download, upload and activate your new plugins.
  2. Religiously follow security updates. When a new security breach pops out, it’s advised to find out about it as quickly as possible and fix it. The fine folks down at Wordpress are most of the time very capable when dealing with this and will immediately release updates to fix various issues. So I’d heartly recommend you subscribe to the Wordpress development blog asap!
  3. Backup! This is a golden rule for any responsible web developer, especially bloggers. What I’d recommend is you make a database backup of your blog each week and a full blog backup (with files, databases etc.) every few months. If you’d like to have automated database backups generated and sent to your e-mail during a specific time interval, you can always try to use the WordPress Database Backup plugin. Works like a charm.
  4. Report bugs. Be a fine fellow/lady and report any kind of security disturbance or vulnerability that you might find. This way you’ll help improve future versions of Wordpress and in term your blog as well. Just a e-mail the security staff from WP at security@wordpress.org and they’ll swiftly take care of it.
  5. Limit user registration. Actually remove the option all together and if someone needs a user, then you can just manually create it. Why is this important? We’ll there’s a lot of automate spam bots out there that scan WP blogs, register at the respective blogs (most of them don’t have anti-automated registration security) and start wrecking havoc where they can.
  6. Fight comment spam. Ah spam, spam bacon, spam sandwich, spam eggs, spam sausages etc, but what us bloggers are faced with daily isn’t a delicious breakfast, but rather with horrific comment spam. Besides the fact that spam comments are really annoying and can fill your blog with pr0n links, they can also infect your blog with some nifty malware. Luckily there are a lot of solutions to spam, like anti-spam WP plugins (see Akismet or Spam Karma 2) or how I personally prefer it (together with Akismet of course): manually moderating comments. Bellow you can find the official WP codex on fighting spam:
    1. Codex on Combating Comment Spam
    2. Codex listing of Spam Tools

Winning The Battle Against Malware

Photo by keso

As I’ve already said at the beginning of the post, a few weeks ago my blog got hacked and infected with malware code. What I want to do now is to tell you, step by step, how I managed to disinfect and get the blog deflagged by Google, because this is the most common hacking scenario you’ll bound to face. Hacking bots will scan for vulnerable blogs and quickly infect them when they find a weak spot to breach. Soon after they’ll add a small snippet of code in your source code, most of the time harmless, hidden under a false tracking script. After they gather enough infected blogs, they’ll sell their loose code space to the highest bidder, which are most of the time fellow Viagra or warez spammers. It’s rough, I know, but when it happens it’s important to keep your cool and keep on walkin.’ I followed this simple steps and got Lost Art Of Blogging deflagged by google in 6 business days.

  1. Realizing your blog’s infected. The first step to solving any problem is realizing what it is. I never knew my blog was infected with malware, until a few readers e-mailed me, letting me know that I was flagged by Google. So how do I know if my blog’s infected? There’s no real helpful way to scan a blog for malicious code, but you can always do it by hand if you suspect something. Just open your homepage, hit code view and quickly scan the code for anything devious; a quick tip would be to look for anything that contains <iframe> tags or hidden code to visitors (width=”0″, hight=”0″). It isn’t very practical but it works. If you don’t find anything you’re home free, if you do, then you’ll might as well continue reading this.
  2. Delete the malicious code. After you find out that your blog’s been infected with malware, the first step you need to take, towards eradicating it, is to look though all your archive under code view for suspicious code. It can take a few hours, but I haven’t found any other way.
  3. Remove any suspicious outgoing links. Most of the time, when a WP blog gets infected with malicious code, the respective spam script will also insert some spam links advertising the services of their “clients.” Some of these domains may be banned and flagged by Google as spam, malware heavens etc., so any blog linking to them will be penalized or in our case, coupled with identified malware presence, will get you flagged big time. You can use the link analysis tool from SEO Chat to check for both inbound and outgoing links. If find anything that points towards warez, viagra, pr0n or anything remotely spamish remove the link at once.
  4. Ask for a StopBadware.org review. StopBadware.org describes itself as a “neighborhood watch,” a Internet malware policeman if you will, that’s job is to find infected websites and flagging them at Google (they have a direct partnership) for quarantine. After you’ve successfully cleansed your blog, following the above steps, you can apply for a site review from StopBadware, which will check for signs of spam and according to this will or will not unflagg you.What you first need to
    do is fill in the review form, type in your blog’s url in the clearinghouse section and query the search. After that all you have to do is fill in some general info about your blog, along with any additional notes that the reviewer should take in consideration and press send. Depending how lucky you are and if you’ve correctly removed all the malware, you should get a positive response in 5-7 business days. If you’ve still got unresolved questions concerning StopBadware, then you should consider heading over to their discussion board and opening a thread.

Blog security has developed into a very delicate issue over the years, as more and more security breaches have occurred, even at the big houses (Al Gore’s blog hacking is the first thing that comes to mind), proving how truly fragile they can be in the face of attacks. It’s up to you and only you, to make sure that your blog’s integrity and privacy rights aren’t comprised in any way.

If you enjoyed this post, then you might consider subscribing to our feed via RSS or e-mail. Find out more about subscribing here. Thanks for visiting!

AddThis Social Bookmark Button AddThis Feed Button
  1. Chris Moran

    I found your site on technorati and read a few of your other posts. Keep up the good work. I just added your RSS feed to my Google News Reader. Looking forward to reading more from you.

    Chris Moran

  2. Hafiz Dhanani

    There have been so many ‘hacked’ stories in the past few months, it’s really unfortunate.

    It’s definitely not fun to have to do all these tweaks to wordpress, databases, etc. but as you’ve illustrated by your story it is neccessary.

    Or you could always just hire a WordPress/security guru to do it for you. Just make sure they’re reliable.

    Thanks for the advice,
    Hafiz Dhanani

    Oh - there’s a small typo. In the first paragraph “hundreds” is misspelled as “hundreads”.

  3. Tibi Puiu

    @Hafiz: if you decided to hire a security consultant or wordpress expert, I’m pretty sure they’ll rip you off big time. If you have a fairly basic understanding of how wordpress works, you won’t have any trouble in applying this changes. And yeah, my bad there was a typo there. Fixed !

  4. andymurd

    Great article - you’ve obviously done your research.

    I would say that if your coding skills are up to it, you should set an automated backup running daily. Burn the backup to CD and take it somewhere safe every week.

    If you’ve really got the script-fu going on, you can build a batch job that will calculate the MD5 sum of every PHP and template file in your Wordpress installation, compare it the last calculated sum and email you if there is any change. This is quite non-standard to Wordpress and should catch most hacks very quickly.

  5. Skellie

    Hey Tibi — thanks for the great article. Can I ask if you had strong passwords at the time? I notice that isn’t mentioned as a tip in the article (but I don’t know how important it is in this instance).

  6. Antiques

    Yes man it is a very painful experience. Bloggers must be extremely careful. But sometimes inspite of being careful spam somehow enters.

  7. Tibi Puiu

    @andymurd: that’s a bit complicated and you’ll get a e-mail with every picture you upload or something, but if you’re sure you didn’t do any changes and still get a e-mail, then something suspicious might be going on. Sounds good, now you only need to convert the idea to a plugin :P.
    @Skellie: No, it wasn’t a strong password, but I don’t think that matter, because my account didn’t get hacked, there were just some “minor” malware injections in some .php files. Oh its pretty important really and I talked a bit about passwords, just a few lines, because that’s a subject too broad to cover now, but I did link to Lorelle’s article on how to pick a safe password.

  8. pablopabla

    This is a stunning post, Tibi! Good advise and tips and I learnt a lot here. I am sure many will also find it useful.

  9. andymurd

    @Tibi: “Sounds good, now you only need to convert the idea to a plugin”

    Aaaargh, another project for me! Sounds like it might be a useful one though.

  10. TzuVelli

    A silver lining in every cloud. Excellent write-up. The AskApache Plug-in looks fantastic. I did not know about this one. I have a few suggestions you may want to add.

    1. Subscribe to blogsecurity.com: these guys are actively pursuing making WordPress and plugi-ins more secure.

    2. Use their WP-Scanner plug-in to scan your installation for security flaws. Can be found here


    3. Use the WPIDS intrusion detection plugin found here


  11. Tibi Puiu

    @pablopabla: thanks a lot man
    @andymurd: I’m sure you’d be successful if you made it :P
    @TzuVelli: Wow, those are some excellent suggestions, especially the WP-Scanner plugin, which looks particularly useful. Thanks a lot for your kind words and time.

  12. Joel

    I have been following these measures for quite sometime now…some others were news to me…will definitely follow that too…Thanks…

  13. Mark

    Tibi - what a GREAT post! Thanks for drafting all of this up. STUMBLED.

  14. Buck

    I never even thought about the table prefix thing. That is hugely important and may save you from many attacks even if you fail to update your stuff in time. It seems like every time I update wordpress a new version comes out less than a week later. It would be nice if they had a better process for that which would automatically check for updates or do it for you.

  15. TC

    Very excellent information, and I consider myself quite wordpress savvy, thank you!

    Question Re: Change your database table prefix

    Is it possible to do that on an established blog? And would that affect installed plugins? Are there instructions somewhere how to do all that?

    Thanks again :)

  16. Tibi Puiu

    @Joel: you’re very much welcomed
    @Mark: thanks a bundle Mark! :D
    @TC: Yes it’s possible, although a bit complicated. However there’s a pretty neat plugin on the web, developed by the fine folks down at Blog Security, called WP Prefix Table changer, that does the job nicely, quickly and painlessly. Haven’t tested the plugin yet, but I’m pretty sure it works fine, but backup your database just in case. If you’d like me to e-mail you a step by step guide on how manually (arghhh) change your WP table prefix, let me know.

    Here’s the plugin:

  17. Geld Lenen

    I’d better upgrade my Wordpress this evening! I even have a old site with Wordpress 1.5. That really is important I guess. Thanks for this reminder!

  18. Microsoft Zune

    Had exactly the same thing happen to my blog by some Saudi hackers a few weeks back. Also running wordpress. Its a shame people do thinks like this. I really dont know what motivates them.

    I got it fixed pretty fast and it hasnt happened again.

    I hope it doesnt happen again for either of us.

  19. Pete White

    Some great tips thanks.

  20. paul

    props on a really good post here. it’s so hard to keep on top of all this stuff. and i think the wp/blogging newbie can get very intimidated with the process. you’ve laid out a good roadmap here.

  21. JF

    About removing any suspicious outgoing links from posts I suggest using the HTMLTaintCheck plugin or Xenu Link checker (software), that is faster than seochat checker and at the same time it checks your site for broken links.

  22. Tibi Puiu

    @JF: thanks for the tip, those will definitely come in handy ;).

  23. Geld lenen

    Good one, mind checking your blog code now and then.
    A lot of blogs are misused for viruses or Iframe attacks.

  24. paresh

    i m thankful for the article blogger security.

  25. John Treby

    Fantastic article-I have already changed a few of your ideas on my blogs-have also downloaded Login Lockdown - also subscribed to your RSS and put a link to your site on my blog recommending bloggers to read your post-Really great help and advice,well done.

  26. Doorlopend Krediet

    I was searching on google upon this subject because my blog running on wordpress was recently hacked by south African hackers, some great tips here and there on this page about how to prevent certain attacks. My host also got it fixed pretty quickly but taking care of extra security measures never hurt. I hope it may never happen for anyone here **again** since you lose a lot of incomes those days..

  27. Jesse

    hi i have a related blog and i would like to exchange links. my email is swinuyasha@gmail.com let me know as soon as possible.

  28. Yen O.

    I thought I wasnt going to like this blog but more I read the more I liked it.

  29. Jim

    This is a stunning post, Tibi! Good advise and tips and I learnt a lot here. I am sure many will also find it useful.

  30. Visa Blackcard

    Hi there, I found your blog on Google, very good!

  31. Setsuko Luginbill

    Wow! Thank you! I usually wanted to write in my website something like that. Can i get component of your
    post to my blog?

  32. methode turf

    I was hugely contented to wallowin this web-site.I wanted to thanks in behalf of your semester in the existent estate of this wonderful ahead of time to!! I certainly enjoying every skimpy footprints of it and I partake of you bookmarked to into on the qui vive bushy-tailed possessions you blog post.

  33. Ben

    update your wordpress files regularly.

  34. T

    Thank you for this wonderful post.

  35. mma training

    Fighting blog hacks wasn’t a concern to me at all until 5 days ago. I know how to fight but I just realised I didn’t know how to fight a hacking attack. I run an MMA training blog and it’s been 5 months of hard work to get it where it was. I secured my wordpress install quite well but my web hosting company got hacked and the hacker got root access to their whole system. It’s been 5 days that I’ve been offline now. (I have 10 sites offline). I’m totally devastated. They assure me they will have me back online soon. This was a hard lesson to learn. From now on, security is my main concern. What nightmare.


  36. Isabel Bautista

    Keep blogging and site-building. Anyway, thank you and I anticipate posting once more sometime!

  37. coconut oil acne

    The consistency is more watery and they mix easily
    with other water-type liquids. The basis for these
    liquid soap recipes is all natural bar soap. Coconut oil is a natural treatment that acts as a relief for eczema.

  38. Mozelle

    These coconut oil facts serve to give you a basic idea of what you
    should expect from using it as a health and skin care product.
    Concentrating on a diet of LOTS of fruits and vegetables (preferably uncooked) and no junk food, should give you
    an observable improvement within 30 days. All you need do is stop cooking with vegetable oils, and start cooking with coconut oil.

  39. Carpentry in Fulton

    Hi, just wanted to tell you, I liked this post.
    It was funny. Keep on posting!

  40. mulch in ann arbor

    This site certainly has all of the information I wanted concerning this
    subject and didn’t know who to ask.

  41. Best extensions in one place!

    Now i am actually impressed along with your publishing capabilities and in addition with all the design and style in your blog page. Is that this a new paid matter or do you colorize it for you your self? At any rate keep up the wonderful excellent crafting, it can be rare to check out an awesome blog page like this one right now.

  42. Free vps

    I know this website gives quality based content and additional material, is there any other website
    which provides these kinds of data in quality?

  43. icloud activation lock bypass

    I’m truly enjoying the design and layout of your blog.

    It’s a very easy on the eyes which makes it much more enjoyable
    for me to come here and visit more often. Did you hire out a developer to create your
    theme? Excellent work!

  44. ios dev pack

    Hmm it appears like your website ate my first comment (it was super long) so
    I guess I’ll just sum it up what I had written and say,
    I’m thoroughly enjoying your blog. I too am an aspiring blog writer but
    I’m still new to everything. Do you have any tips for newbie
    blog writers? I’d really appreciate it.

  45. chanel handbag collection

    chanel Handbag buy
    Hola! I’ve been following your web site for some time now and finally got
    the courage to go ahead and give you a shout out from Austin Texas!
    Just wanted to say keep up the great work!

  46. Renee

    Robotnik’s Mean Bean Machine, Wario in the odd Wario’s Woods,
    and others. Allowing players to play as Virtua
    Cop’s Janet and Daytona USA’ Hornet racing car gave this 3D fighting game a true feel of the Sega world.
    Still another striking component is the rod’s portability.

  47. Canada Chanel Bags

    online chanel Handbags
    Wonderful article! This is the type of information that
    are supposed to be shared across the net. Shame on Google
    for no longer positioning this post upper! Come on over and visit my web
    site . Thanks =)

  48. doorlopend krediet

    My relatives every time say that I am killing my time here at web, except I know I am
    getting knowledge everyday by reading such pleasant articles.

  49. Chanel Designer handbags

    chanel Bag Mexico
    Does your website have a contact page? I’m having problems
    locating it but, I’d like to shoot you an email.
    I’ve got some recommendations for your blog you might be interested in hearing.
    Either way, great website and I look forward to seeing it improve over

  50. persoonlijke lening

    Undeniably believe that which you stated. Your favorite justification appeared to be on the web the easiest thing to
    be aware of. I say to you, I certainly get annoyed while people consider worries
    that they plainly don’t know about. You managed to
    hit the nail upon the top and defined out the whole thing without having
    side effect , people can take a signal. Will probably be back to get more.

  51. how to make money online fast

    Wow that was unusual. I just wrote an extremely long comment but after I clicked submit my comment didn’t
    show up. Grrrr… well I’m not writing all that over again.
    Anyway, just wanted to say wonderful blog!

  52. героин

    Great post however I was wanting to know if you could
    write a litte more on this subject? I’d be very
    grateful if you could elaborate a little bit further. Cheers!

  53. Ray Ban Clubmaster

    Link exchange is nothing else but it is just placing the other person’s web site link on your page at suitable place and
    other person will also do similar in favor of you.

  54. bypass activation ios 7

    Howdy! I understand this is kind of off-topic
    however I had to ask. Does building a well-established blog like yours require a massive amount work?
    I am completely new to blogging however I do write in
    my diary every day. I’d like to start a blog so I can share my
    own experience and feelings online. Please let me know if you
    have any suggestions or tips for brand new aspiring blog owners.
    Appreciate it!

  55. compost bin plans

    Many significant factors just for all of these some will probably more than likely upset category
    from this number. Tools ‘ These can be sold on a site like
    e - Bay or Craig list or bartered with friends. To escape all this
    trouble and to save a lot of time and energy, a compost tumbler is your best option.

  56. קוסם

    My friend Justin knocked out my tooth at recess, and I couldn.
    Here the kids’ party magicians are very well behaved and have a good knowledge of the art of
    keeping the audiences glued to their seats. Presented in stark contrast is his wife Lois- the attractive, logically thinking wife representing the fantasy of all American males.

  57. Katherina

    Why viewers stil make use of to read news papers when in this technological globe all is accessible on web?

  58. funny videos

    Hello there, just became aware of your blog through Google,
    and fojnd that it’s truhly informative. I am gonna watch outt for brussels.
    I’ll appreciate iif you continue this in future.

    Lots oof pekple will be benefite from your writing.


  59. diy wood projects

    The two of them had searched for the perfect house to buy,
    and after months of looking, decided on the perfect home in Charleston, SC.
    By taking advantage of the latest computer technology this product has compiled enough projects to fill many bookshelves.

    Despite this single obvious benefit, bats are often thought of in popular culture
    with reference to Bram Stoker’s fictional vampire Dracula, even
    though the majority of bats do not drink blood.

  60. aguicheuse XXX

    Excellent post, eոcore une fois

  61. tren.nu

    SupeгЬe post сomme d’habitude

  62. ชุดเดรส

    Thewre are several things you should carefully consider when choosing the frames
    suitable for you. In terms of men, a popular
    piee of jewelry often includes large pendant necklaces,
    many of which shows a cross orr a more popular or meaningful symbol.
    Fashikon is a fickle indusstry and no more so to tuose whose lives are dictated
    by it, egen though they don’t actually wear the clothes.

  63. las vegas credit repair

    It is however, not mandatory for you to do it on your
    own, or to seek the services of credit repair companies to do it for you.
    Credit repair professionals deal with problematic credit repair situations on a regular basis
    such that they have developed the necessary communication and networking skills to aid in these matters.
    One of the best ways that you can avoid coming into contact with these businesses and keeping
    your credit in good order is to do seasonal
    reviews of your credit history.

  64. www.equgo.pisz.pl

    Greetings! Very helpful advice within this post! It’s the little changes that will make the most significant changes.
    Many thanks for sharing!

  65. seymourzgbf.kazeo.com

    Someone essentially assist to make significantly posts
    I’d state. That is the first time I frequented your web page and
    so far? I surprised with the analysis you made to create this actual put up amazing.
    Wonderful job!

  66. steam keys

    My partner and I stumbled over here by a different web address and thought I might as well check
    things out. I like what I see so now i am following you.

    Look forward to finding out about your web page again.

  67. efficaciousnosh51.jimdo.com

    Je poste ce com simplement pour congratuler son auteur

  68. More Info

    As the admin of this site is working, no uncertainty
    very soon it will be famous, due to its feature contents.

  69. Car Garage

    Nice post. I learn something totally new and challenging
    on blogs I stumbleupon every day. It will always be interesting
    to read articles from other writers and practice a little something from other websites.

  70. http://www.docdroid.net/ciqt/1400815572537ebfd462b28.pdf.html

    It’ll be really cool to receive these nihe options in your own business
    phone also. For a limited time Verizon’s offering a two-for-one deal:
    you can get two M8s for a total of $199. This is one of those great little iPhone 4 tips that can save time and energy
    navigating through your phone. Foor some, this difference
    is of little importance, since both phones are quick and
    efficient. Apple has mounted a rigorous campaign to end
    consumers from jailbreaking or unlocking iPhones and iPads, so be cautious, but
    loosen up jail breaking is now entirely legal, nonetheless it
    does hqve some downfalls which I will reveal later on. You will find numbers about products
    will bbe able to on your machine the instant you prefer to jailbreak doing it.
    As youu can see, it’s a simple process to get started with PPTP
    or L2TP VPN for Android and iPhone users. This jailbreaking application is actually a MAC OS based custom firmware
    application that has user defined controls.
    Sometimes you lock the phone and forget the password.

    *Flashlight* also features the LED light feature, but not
    much else beyond that. He is one of the head members of the Chronic Dev Team and developed the jailbreak tool GreenPoison. However,
    untethered you will be allowed to reboot as usual.
    Visit BuildMyComputer:Hardware News, Tests and Reviews.
    The total cost of replacing the LCD screen on an iPhone
    does not even come close to what a new one would cost without
    the discount given by a service upgrade. This is a perfect replacement of stethoscope and records show more than 3 million doctors have downloaded
    this amazing application. The search for thhe most user-friendly smartphone on the
    market stops here, with almost all consumers annd critics agreeing that Apple’s new iPhone is not only fiscally responsible,
    but technologically responsible as well. Once
    you jailbreak your Apple device you will not lose any of the features and functionality of your device.
    The jailbreak procedure itself is quite effortlessand I claim that
    from somebody who started off jailbreaking back with my iPhone 3G.
    You can hire iPhone app developer or dedicated iPhone
    App development Team from them. com no application of course, which is the veryy software that will allow the jailbreak to occur in the first place.
    If your iPhone somehow losses its connection while uploading a dictation, there’s a resume feature
    so you don’t have to upload the whole dictation file again. Completing a simple task can feel like jumping
    through hoops with a BlackBerry because of excessive scrolling and menu navigation. The A5 portion of the
    name comes from the A5 processors in boyh the iPad 2 and iPhone 4S.
    In fact, almost everything you do on the iPhone willl result in you having to pay a fee of some type.
    Article Source: you looking for more information regarding jailbreak iphones easily.

  71. http://jailbreakiphone5353.pen.io/

    With jail breaking the phone we can installl all the application available.
    The iPad Update button is the enemy of any Jailbroken iPadd because Update is just Apple’s
    way of saying “undo any jailbroken Apple device. Whether you want to carry videos, music, photos or documents, you can easily put them on your phone. Try to find a plan that is balanced and one that suits your requirements and you will be able to get the iPhone for a great price and make use of all the features that it has available as frequently as you require them. Just so that they can feel that they are standing out as individuals and are part of a special segment of society that are just a little bit more freethinking than the rest. Everything is coordinated behind the scenes, so all you have to do is click the link, type in your URL, and go. As the app description states, if you’re just looking for a no-cost, no-ad, no-frills flashlight for your iPhone 4, *Flashlight* is a good bet. It is, consequently, a good idea to go for the second alternative. Finally after 4 years of having the PlayStation 3 on the market the PS3 Jailbreak is finally here. After the standard inspection, it usually takes a week to process the payment, and you can choose to have it through PayPal; as a check; or as an Amazon Gift Card. It seems early for this to happen, but it appears that the iPhone 5 has already been jailbroken. Headphone reviews: Panasonic RP-HT21 headphones designed for avid lovers of music at low price. So, here are 5 different games waiting for you to play. Why not simply unlock iphone and install what all you want. s highly addictive and guaranteed to keep you entertained for hours. The iPhone has a great camera and takes quality videos. Lastly, you can select the “Sync Failed Media Files” option to sync those files and data that are not synced properoy (or delete them when the syncing fails). InstallousTo get free applications open up Cydia, go to manage on the bottom. You can choose web content, video or you can have a rotating slide show of changing images of your choice. They are working with the clients, and monitoring the application development procedure. In short it lets you learn on the go, and keep track of the most interesting notes and media that students might need foor a class prpject or presentation. Hit “Sync Contacts” and after a permissions page, your phone will do the rest. The iPhone doesn’t allows to replace the battery as its completely packed inside the iphone body, so the best option to keep the phone alive it to charge the packed battery annd the most handy and easiest way to charge your iphone is to use portable charger. Download this today and see why it is one of the top 10 iPod touch apps that are used in the Math classroom. First of all you will be able to stretch the functions of your phone enabling more capability than what Apple have tried so much to restrict.

  72. weight loss programs

    Take all these things into consideration when you are planning your workbench.
    How can you lose with the capacity to perform so many distinct exercises such as squats, extensions,
    curls, lat pull downs, chin ups, as well as a number of other exercises.
    If you have 50 points in Speech, you can get Dog to calm down.

  73. top 10 diet pills for Women

    It’s difficult to find experienced people about this topic, however,
    you seem like you know what you’re talking about!

  74. Free Download Game Full Version

    magnificent post, very informative. I ponder why the other
    experts of this sector don’t realize this. You should continue your writing.
    I am sure, you have a huge readers’ base already!

  75. rem sleep disorder treatment

    Hey There. I found your blog using msn. This iss a really wedll written article.
    I will be sure to bookmark it and retuhrn to read more of your
    useful info. Thanks for the post. I’ll definitely return.

  76. play.google.com

    Hi there, after reading this amazing article i am too cheerful
    to share my experience here with mates.

  77. garcinia cambogia good for you

    That is a really good tip especially to those new to the blogosphere.
    Brief but very precise info… Thanks for sharing this one.
    A must read post!

  78. challengingreactions.yolasite.com

    Une fois de plus un magnifique poste : j’en parlerai dans
    la journée avec mes potes

  79. CheatGames.Info

    Hi there, every time i used to check weblog posts here in the early hours in the morning,
    since i love to find out more and more.

  80. Miami Seo Companies

    Hello, its good paragraph regarding media print, we all know media is a impressive source of information.

  81. rightcondition.com

    Appreciating the time and energy you put into your site and in depth information you offer.

    It’s nice to come across a blog every once in a while that isn’t the
    same out of date rehashed information. Great read! I’ve bookmarked your site and I’m including your RSS feeds to my Google account.

  82. morue cocotte

    Très bon poste, j’espère en discuter dans la soirée avec certains
    de mes potes

  83. vermontseoexpert.blogspot.com

    All the best for you. I enjoy your internet site, so much quality content
    on it! All the most effective.

  84. source

    This is the ideal time to make a number of ideas in the future as well as it time for it to smile. I’ve check this out distribute if I might just I actually prefer to counsel you couple of amazing problems or even suggestions. Perhaps you can create following articles or blog posts about it report. I personally wish to get more information issues close to them!

  85. parenttrapping.com

    Thanks for one’s marvelous posting! I genuinely enjoyed reading it, you’re a great author.I will remember to bookmark your
    blog and will eventually come back sometime soon. I want to encourage one to continue your great job, have a nice evening!

  86. Hortense

    I am really inspired together with your writing abilities as neatly as with the format in your weblog.
    Is this a paid subject matter or did you customize it your
    self? Either way stay up the nice high quality writing, it’s uncommon to look a great blog like this one

  87. Yacon Extract reviews

    I get pleasure from, cause I found just what I used to be having a
    look for. You’ve ended my four day long hunt! God Bless
    you man. Have a nice day. Bye

  88. www.glutenfreeblondie.com

    What a material of un-ambiguity and preserveness of valuable knowledge on the topic
    of unpredicted emotions.

  89. gang bang hard gratuit

    Je n’aі guère terminé dde lirе paar contrе je passe
    ce soir

  1. 1 Another Danger of Getting Your Blog Hacked… | Keith Goodrum

    [...] Puiu over at The Lost Art Of Blogging wrote a post titled, Fighting Blog Hacks: Preventing And Eliminating Intruders. One of the problems I didn’t talk about in my post, Can Somebody Drive a Truck Through The [...]

  2. 2 TechTraction » Friday Finds 03/14/2008: Fighting Blog Hacks

    [...] of the latest posts I’ve come across on this subject is Fighting Blog Hacks: Preventing and Eliminating Intruders by Tibi Puiu from Lost Art of Blogging. Specifically, I like that this article doesn’t just [...]

  3. 3 This Month In SEO - 3/08 - TheVanBlog

    [...] Fighting Blog Hacks: Preventing And Eliminating Intruders [...]

  4. 4 WordPress Security - 8 Things You Can Do Now | Brent.fm - a technology mixdown

    [...] Fighting Blog Hacks: Preventing And Eliminating Intruders Mar 6, 2008 in Blogging Tips, The Net [...]

  5. 5 Tutorius - Tutorials & Articles for the rest of us » Securing your WordPress Blog

    [...] http://www.lostartofblogging.com/fighting-blog-hacks-preventing-and-eliminating-intruders This entry is filed under WordPress. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site. Leave a Reply [...]

  6. 6 WORDPRESS VULNERABILITY: Have you been hacked yet? - Blogging & Business Forums

    [...] installation of Wordpress. Check out this excellent post to secure your Wordpress installation. Fighting Blog Hacks: Preventing And Eliminating Intruders | Lost Art Of Blogging __________________ Blogging Tips and Social Media | Fresh Tech [...]

  7. 7 Rehabilitació d’un blog | Carta de navegació

    [...] val més la pena perdre el temps.. a mes, pel que pareix ha sigut un atac a gran escala, he trobat mes afectats per eixes dates. [...]

  8. 8 WordPress Can Get Hacked-Protect Now With Free Plugin.

    [...] was reading a article from Lost Art Of Blogging. Which scared me a little as I would hate to have my site being redirected by hackers to a site [...]

  9. 9 Hardening Wordpress | CatSpit

    [...] only the files and users you want to see your content have access to them. There are a series of good guides on how to do this easily via .htaccess files. You certainly want to restrict wp-admin (I only allow [...]

  10. 10 Protect your wordpress blog from hackers, secure your website | Hen Design Studio

    [...] Fighting Blog Hacks: Preventing And Eliminating Intruders [...]

  11. 11 Tips for protecting your blog

    [...] here’s Fighting Blog Hacks: Preventing And Eliminating Intruders, a good, very detailed read. ~ Diane [...]

  12. 12 hacked « ++ EXPLICITBEDLAM.org / / /

    [...] a list of helpful websites in case you wordpress users want to secure your websites as well: 1 2 3 If you don’t want to do all of them, at least change your password to something difficult. My [...]

  13. 13 Articles


    [...]Fighting Blog Hacks: Preventing And Eliminating Intruders | Lost Art Of Blogging[...]…

  14. 14 videomoz.com

    Fighting Blog Hacks: Preventing And Eliminating Intruders | Lost Art Of Blogging…

    Unlike olive oil, extra-virgin coconut oil means exactly the same as its virgin counterpart. Therefore oil is an essential component in healthy, clear skin. Other reports suggest the coconut oil benefits our pets in many areas. Unlike olive oil, extra-…

Leave a Comment

Please read the Comment Policy

© 2007 - 2008. All rights reserved Lost Art Of Blogging. Designed by Paul Stamatiou and customized by Tibi Puiu.
Creative Commons License This work is licensed under a Creative Commons Attribution-Noncommercial 3.0 United States License.