If you have done any web development or website maintenance work, then you must have come across the .htaccess file at some point. This is an important file for many reasons and this guide will provide an overview of what the .htaccess file is, what you can do with it, how to create it, and options available to you for editing it on your WordPress website.
This WordPress Password Hash Generator uses the official WordPress hashing function wp_hash_password() behind the scenes. With this tool, you can convert a password to its hash code (or hash sum or checksum), which can then be used to set a new password directly in the WordPress MySQL database.
Hackers continue to think of new ways to get around security blocks on websites. Their goal is to bypass your user authentication process and gain access to sensitive data. Two-factor authentication (also known as 2FA or two-step verification) is one way to stop them in their tracks. This article explains two-factor authentication, the security process, and highlights what you need in order to implement it on your site.
Saving a password in a browser might seem like a bad idea from a security perspective. But not really. For certain types of malware, saving a password in a browser could actually be a security measure. Very specifically, it can add a layer of security against keyloggers. This article explains what keyloggers are, and how saving your password in your browser could protect you against them.
Since the Snowden saga, everyone and their brother is now paranoid about government snooping and the privacy of their data and devices. There are discussions around how the big tech companies are misusing our data and how the government has access to all our social media information and chat history. We however, need to remember that the worst of the bad guys (at least for regular internet users) are not the government or social media companies at all. The more dangerous security and privacy threats are still regular hackers who are out to steal our data and use them for nefarious purposes.
Many individuals and organizations implement virtual machines and dedicated servers using Amazon Elastic Cloud Compute (EC2). Like any other host on the Internet, your Amazon EC2 instances can be vulnerable to attack if you don’t take special precautions. In this article, I explain some of the most important things you should do to secure your Amazon EC2 instance.