|Ratings||Unique User Downloads||Download Rankings|
|58%||Total: 695||All time: 4,645 This week: 254|
|pareto_security 2.3.4||GNU General Publi...||5.3.0||PHP 5, Security|
This class can filter requests to recognise malicious values and either call a 403 access denied ( default ), or optionally add the offending IP address to the banned list in the root htaccess file of a website.
=== Pareto Security === Contributors: @te_taipo Tags: wordpress security, hack, database security, xss, WAF, CRLF, CSRF, command injection, cross-site scripting, exploit, firewall security, hack, hacked, hacker, injection, authentication bypass, local file inclusion, malware, phishing, rfi, remote file inclusion, scrapers, secure, secure login, security, SQL Injection, vulnerability, WAF, website security, wordpress, security Donate link: https://hokioisecurity.com/donations/ Requires at least: 4.7.2 Tested up to: 5.1.1 Requires PHP: 5.3 Stable tag: 2.3.4 License: GPLv2 or later License URI: http://www.gnu.org/licenses/gpl-2.0.html
WordPress Core Security: Secure your website with real security.
== Description ==
Had enough of the security theatre presented by the raft of Wordpress security plugins? Time to put a stop to the attacks!
Firstly Wordpress and most other CMS\'s are built using PHP. PHP is a very insecure programming language, even worse in the hands of amateurs.
Wordpress has been plagued by plugins authored by amateurs that bring with them security vulnerabilities.
Security plugin designers mostly focus on cleaning up attacks rather than stopping them dead in their tracks.
Pareto Security class acts as a Central Security Hub checking all inputs from users, preventing bad requests from executing on your website.
= A Word on Security: = By the very nature of plugins, no plugin should ever claim to be a Web Application Firewall.
No security plugin can save your website from really-really badly written site, theme and/or plugin code.
No security plugin can save your site from attacks that result from when administrators do not follow basic security practices.
Keeping any CMS as secure as possible is not easy. The very best thing you can do to prevent attacks is to always keep your website code, themes and plugins up to date, and remove any plugins and themes you are not using.
== Installation == * Automated Setup Steps
== Frequently Asked Questions == = How does Pareto Security protect sites from attackers? =
The Pareto Security developers understand how PHP - the coding language in which Wordpress is written in, can be exploited. Pareto Security principles of protection stop these attacks at the entry point.
= How does the Pareto Security Protection work? =
= What checks does the Pareto Security Scanner perform? =
= What security monitoring features does Pareto Security include? =
= How will I be alerted if my site has a security problem? =
Pareto Security sends attack alerts via email. Once you install Pareto Security you can enabled email notifications. You will never be flooded with notifications as Pareto Security only sends notifications of high risk attacks that have been blocked.
= Do I need other security plugins or cloud based firewalls? =
Pareto Security provides true entry-point security for your WordPress website. Pareto Security does not prevent or have conflict with other webserver security addons and hardware web application firewalls.
= What blocking features does Pareto Security include? =
= What differentiates Pareto Security from other WordPress Security plugins? =
= How can I contribute to the cause =
Donations via: Go to https://hokioisecurity.com/donations/
= Do you have an email contact? =
Email me at email@example.com
Other contacts: https://taipo.github.io/contact/
== Changelog ==
= 2.3.4 = * Proxy attempts now medium risk * Option to restrict Tor users access preventing admin, logging in, and search functions
= 2.3.3 = * Attempts to proxy through Server IP are now banned. * More work on addressing HTACCESS bugs
= 2.3.2 = * Removed the Safe reference to whitelisted ip addresses * Repair bug in code that can corrupt the htaccess file
= 2.3.1 = * Fixed bug in email report
|Version Control||Unique User Downloads||Download Rankings|
|User Ratings||User Comments (1)|