There are a number of interesting attacks out there, and one of them is related to Genericons, which are used by the Twenty Fourteen theme. There are also serious performance issues with Genericons, so dumping them is a good idea. Here is how I did that without using a child theme. My whole goal for …
Continue reading “Removing Genericons from Twenty Fourteen Theme”
In WordPress Hacked: Security Steps Take II, I wrote about the tools and steps to take to secure your WordPress installation. The current steps to take are the same. The tools, however, have changed significantly. Even as the steps changed from WordPress Hacked: Security Steps, now we look at the tools once more. I will …
Continue reading “WordPress Hacked: Security Steps and Cleanup Take III”
I have written about upgrading VMware vCenter Log Insight (vLI) in the past, but I have not discussed my first content pak for Log Insight. You can find my discussion on how to set up this content pak below. This was recorded at VMworld 2014 by the vBrownBag folks. I would like to thank them …
Continue reading “vSphere Upgrade Saga: Log Insight Content Pak”
I’m tired of moving spam mail to spam folders from which the system never learns. So it’s time for me to try a new approach. Read more
It has been a year since I wrote WordPress Hacked: Security Steps and there are now some new plugins and tools to help with security of your WordPress site. The steps to take to find hacks are the same as the security steps previously mentioned, but there are some new tools and services that may make your life easier and alleviate more attacks. So here is an updated set of rules, plugins, and actions to take. I suggest Reading the original post as a part of this one.
I recently upgraded my 2 generation old Mac Book Pro to a new Retina Mac Book Pro and inadvertently found a way to increase security of the device. I thought it was originally a bug, but after discussing with several Apple Technicians, what I did, while inadvertently is by design. In essence, I added a secondary login screen to my Retina Mac Book Pro with each requiring a different set of credentials. But how did this happen and is it worth the extra layer of protection?