Information Security, Ethical Hacking, website Security, Database Security, IT Audit and Compliance, Security news, Programming, Linux and Security.
Monday, 29 April 2013
Hackers Blocked By Stealth Login Scripts For WordPress
After being hacked over a period of several months and as a result, experiencing very high CPU usage on his shared hosting websites, Dr. Peter Achutha has developed several techniques to defeat hackers.
One of these techniques is to use login php scripts that are designed to defeat hackers and make it very difficult to login into software such as WordPress. He has developed two php login scripts that he is giving away freely so that many honest to God hard working bloggers can protect their blogs from hackers. Login php scripts can now operate in stealth mode. His article on stealth login in scripts on his website shares more details and the free download.
The other technique he has explained is how to generated powerful easy to remember passwords. From experience he has found that good passwords can take years to hack. He says “A government or private institution had used 30 PC’s or more to break my passwords. They had tried more than 28,000,000 attempts over a 24 hour period to log into my websites and then gave up. My sites are still running.” His other article on secure hack proof passwords teaches users how to make passwords more difficult to hack.
Dr. Achutha states that some other application other than WordPress is still able to use his php login scripts. As long as there is a separate php login script for the application package one can substitute his login scripts to block hackers. Having installed his login scripts you can then go into stealth mode and hide from potential hackers. He says, “Techniques similar to password protection methods can be used to go into stealth mode. In addition if your software is not WordPress but you have a wp-login.php login script then hackers will be misguided and try to hack your site as a WordPress site. This will increase the difficulty level for hackers.”
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment