LEADER 05209nam 2200781 a 450 001 9910969059703321 005 20240516184709.0 010 $a9786613349248 010 $a9781283349246 010 $a1283349248 010 $a9781849512114 010 $a1849512116 035 $a(CKB)2550000000039312 035 $a(EBL)948509 035 $a(OCoLC)797917449 035 $a(SSID)ssj0000526671 035 $a(PQKBManifestationID)11327408 035 $a(PQKBTitleCode)TC0000526671 035 $a(PQKBWorkID)10537561 035 $a(PQKB)10807135 035 $a(Au-PeEL)EBL948509 035 $a(CaPaEBR)ebr10481033 035 $a(CaONFJC)MIL334924 035 $a(PPN)228011213 035 $a(FR-PaCSA)88851680 035 $a(MiAaPQ)EBC948509 035 $a(FRCYB88851680)88851680 035 $a(DE-B1597)722294 035 $a(DE-B1597)9781849512114 035 $a(EXLCZ)992550000000039312 100 $a20110714d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aWordPress 3 ultimate security $eprotect your WordPress site and its network /$fOlly Connelly 205 $a1st ed. 210 1$aBirmingham, United Kingdom :$cPackt Open Source,$d2011 215 $a1 online resource (408 pages) 225 1 $aCommunity experience distilled 300 $aIncludes index. 311 08$a9781849512107 311 08$a1849512108 327 $aCover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: So What's the Risk?; Calculated risk; An overview of our risk; Meet the hackers; White hat; Black hat; Botnets; Cybercriminals; Hacktivists; Scrapers; Script kiddies; Spammers; Misfits; Grey hat; Hackers and crackers; Physically hacked off; Social engineering; Phone calls; Walk-ins; Enticing URLs; Phishing; Social networking (and so on); Protecting against social engineering; Weighing up Windows, Linux, and Mac OS X; The deny-by-default permission model 327 $aThe open source advantageSystem security summary; Malwares dissected; Blended threats; Crimeware; Data loggers; At loggerheads with the loggers; Hoax virus; Rootkits; Spyware; Trojan horses; Viruses; Worms; Zero day; World wide worry; Old browser (and other app) versions; Unencrypted traffic; Dodgy sites, social engineering, and phish food; Infected public PCs; Sniffing out problems with wireless; Wireless hotspots; Evil twins; Ground zero; Overall risk to the site and server; Physical server vulnerabilities; Open ports with vulnerable services; Access and authentication issues 327 $aBuffer overflow attacksIntercepting data with man-in-the-middle attacks; Cracking authentication with password attacks; The many dangers of cross-site scripting (XSS); Assorted threats with cross-site request forgery (CSRF); Accessible round-up; Lazy site and server administration; Vulnerable versions; Redundant files; Privilege escalation and jailbreak opportunities; Unchecked information leak; Content theft, SEO pillaging, and spam defacement; Scraping and media hotlinking; Damn spam, rants, and heart attacks; Summary; Chapter 2: Hack or Be Hacked; Introducing the hacker's methodology 327 $aReconnaissanceScanning; Gain access; Secure access; Cover tracks; Ethical hacking vs. doing time; The reconnaissance phase; What to look for; How to look for it; Google hacking; More on Google hacking; Scouting-assistive applications; Hacking Google hacking with SiteDigger; WHOIS whacking; Demystifying DNS; Resolving a web address; Domain name security; The scanning phase; Mapping out the network; Nmap: the Network Mapper; Secondary scanners; Scanning for server vulnerabilities; Nessus; OpenVAS; GFI Languard; Qualys; NeXpose and Metasploit; Scanning for web vulnerabilities; Wikto; Paros Proxy 327 $aHackerTargetAlternative tools; Hack packs; Summary; Chapter 3: Securing the Local Box; Breaking Windows: considering alternatives; Windows security services; Security or Action Center; Windows Firewall; Windows Update; Internet Options; Windows Defender; User Account Control; Configuring UAC in Vista; Configuring UAC in Windows 7; Disabling UAC at the registry (Vista and 7); UAC problems with Vista Home and Premium; Proactive about anti-malware; The reactionary old guard: detection; Regular antivirus scanners; The proactive new guard: prevention; The almost perfect anti-malware solution 327 $aComodo Internet Security (CIS) 330 $aProtect your WordPress site and its network. 410 0$aCommunity experience distilled 606 $aComputer networks$xSecurity measures 606 $aWorld Wide Web$xSecurity measures 606 $aData protection 615 0$aComputer networks$xSecurity measures. 615 0$aWorld Wide Web$xSecurity measures. 615 0$aData protection. 676 $a006.7 676 $a006.752 700 $aConnelly$b Olly$01794992 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910969059703321 996 $aWordPress 3 ultimate security$94336004 997 $aUNINA LEADER 01774oas 2200661 c 450 001 9910805593303321 005 20251105213014.0 024 7 $a10.20057/j.1003-8620 035 $a(OCoLC)62606600 035 $a(CONSER) 2024237078 035 $a(CKB)110978984078567 035 $a(EXLCZ)99110978984078567 100 $a20051215a19809999 uy e 101 0 $achi 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$a??? 210 1$aHubei Sheng Huangshi Shi$c"Te shu gang" za zhi she 215 $a1 online resource 311 08$aPrint version: ???/#/??? [[te shu gang]] (DLC) 2001202590 (OCoLC)47203431 1003-8620 517 1 $aSpecial steel 517 1 $aTeshuguang 606 $aSteel$vPeriodicals 606 $aSteel$xMetallurgy$vPeriodicals 606 $aAcier$vPe?riodiques 606 $aAcier$xMe?tallurgie$vPe?riodiques 606 $aAcero$vPublicaciones perio?dicas$2embne 606 $aAcero$xMetalurgia$vPublicaciones perio?dicas$2embne 606 $aSteel$2fast 606 $aSteel$xMetallurgy$2fast 608 $aPeriodicals$2fast 615 0$aSteel 615 0$aSteel$xMetallurgy 615 6$aAcier 615 6$aAcier$xMe?tallurgie 615 7$aAcero 615 7$aAcero$xMetalurgia 615 7$aSteel 615 7$aSteel$xMetallurgy 676 $a569.14 801 0$bHUA 801 1$bHUA 801 2$bOCLCQ 801 2$bOCLCF 801 2$bOCLCO 801 2$bOCLCQ 801 2$bOCLCO 801 2$bOCLCQ 801 2$bTOH 801 2$bOCLCQ 801 2$bCUV 801 2$bOCLCQ 906 $aJOURNAL 912 $a9910805593303321 996 $a???$94457009 997 $aUNINA