How to increase the safety of WordPress

increase-the-safety-of-WordPress“Important Announcement: WordPress Brute-Force proactive mitigation” that there is an on going and highly distributed, global attack on WordPress installations to crack open admin accounts and inject various malicious scripts.

To give you a little history, we recently heard from a major law enforcement agency about a massive attack on US financial institutions originating from our servers.

We did a detailed analysis of the attack pattern and found out that most of the attack was originating from CMSs (mostly wordpress). Further analysis revealed that the admin accounts had been compromised (in one form or the other) and malicious scripts were uploaded into the directories.

Today, this attack is happening at a global level and wordpress instances across hosting providers are being targeted. Since the attack is highly distributed in nature (most of the IP’s used are spoofed), it is making it difficult for us to block all malicious data.

To ensure that your customers’ websites are secure and safeguarded from this attack, we recommend the following steps:
1. Update and upgrade your wordpress installation and all installed plugins
2. Install the security plugin listed here: https://wordpress.org/extend/plugins/better-wp-security/
3. Ensure that your admin password is secure and preferably randomly generated
4. Other ways of Hardening a WordPress installation are shared at https://codex.wordpress.org/Hardening_WordPress

These additional steps can be taken to further secure wordpress websites:
• Disable DROP command for the DB_USER .This is never commonly needed for any purpose in a wordpress setup
• Remove README and license files (important) since this exposes version information
• Move wp-config.php to one directory level up, and change its permission to 400
• Prevent world reading of the htaccess file
• Restrict access to wp-admin only to specific IPs
• A few more plugins – wp-security-scan, wordpress-firewall, ms-user-management, wp-maintenance-mode, ultimate-security-scanner, wordfence, https://wordpress.org/extend/plugins/better-wp-security/ These may help in several occasions.

Computer Security – Get rid of Malware, Spyware and Adware Now

Computer-Security-Get-rid-of-Malware,-Spyware-and-Adware-NowYou should know to secure your computer from getting hacked by some remember if you follow these guidelines it will be extremely difficult for a hacker to enter into your PC and to hack your data. As today everything from banking, business, studies etc is online so the threat of being hacked is becoming more and more dangerous. Ok, so listed below are the steps you should follow.

Do not disclose your IP address:
This biggest mistake you could ever do, never disclose your IP address to anybody because ip address is the address of your computer. once the hacker knows the address of your computer it will be easy for him enter into your home(computer) and steal your accessories ( data and passwords).

Do not download any suspicious software or attachments:
A lot of people search for cracks and keygens online. Remember this is most exploited method used by the hackers to hack into the PC (personal computer) they usually attach a key logger or virus with the crack or the keygen. Once you download and install it then your data will be automatically sent to the hacker without your permission and this might lead to a disaster if you are a online business man because your sensitive information such as Paypal account information, e-mail account information can be sent to the hackers.

Use good antivirus and firewall program:
Do not depend upon windows firewall to protect yourself from online hackers. It is always a wise decision to use a good firewall program and do install a good antivirus program. If you don’t have enough money right now go for the free antivirus and firewall program but make sure that you have a updated antivirus and a firewall installed on your computer.

Use secure passwords (3D passwords):
Always use 3D passwords to protect your accounts from getting hacked. Your password must contain digits, special symbols like underscore (_) and characters. Do not use small passwords. Your password should be at least eight characters long in length ( 6w5;Lh8q*AsZ ) make strong random password from this link: Password Generator

Always logout from your accounts:
You should always logout from your accounts instead of closing the browser window directly because whenever you login into your account a cookie is placed by the server into your account and when you logout this cookie is deleted. If you do not logout and the cookie is not deleted the hacker might gain access to this cookie and then he would be able to login into your account from his pc.

Make backup of your data:
Some viruses are made to destroy your data so it is always advisable to store your data in a backup file.various good data backup programs are available on the internet.

Get rid of Malware, Spyware and Adware Now
Malware means software that was made to get into and damage your computer system without your consent. Once it appears on your machine, it can be very challenging to get rid of while it differs from program to program, malware can either be annoying or seriously damaging to all components of your system. By law, malware is a computer contaminant, making it completely illegal.

To remove malware safely and efficiently, you need a tool that puts the most responsive scanner in your hands. PC cleaner doesn’t just remove adware and spyware on your computer, it seeks out subsidiary registry entries and duplicate files in order to destroy them, leaving nothing behind that can threaten your system.

Spyware is also notorious for making your PC sluggish and unresponsive. Sometimes this is by design but many times the sluggish performance is a result of poorly created spyware and malware programs that conflict with the other programs running on your computer.

Many programs that are free on the internet contain spyware and people should always be careful of this when installing such programs on their computer. Once installed, these tiny programs can run completely undetected collecting your personal information, tracking the tasks you perform on your computer, or bombard you with annoying pop ups and ads.

Spyware is such a huge problem that Dell Computers reports 20% of all their tech support calls involve Spyware and Virus related problems. Even worse, these problems take 2-3 times longer to solve than non-spyware related support calls.

As a result, spyware now infects close to 90% of all internets connected computers with an average of 25 instances of spyware and virus per PC.

Just a few of the things spyware and malware can monitor and collect about you:

The Web Sites You Visit
Your Instant Message Conversations
Credit Card Numbers You Use
The Items You Purchase Online
Usernames and Passwords Used To Access Your Favorite Sites
Your Incoming and Outgoing Email Messages
Your Bank Account Numbers
Other Important and Personal Information

Reset or Remove Forgotten Windows 7 Password (Updated)

Today we will learn how easily you can reset forgotten Windows 7 password without third-party software.

Video Tutorial Link: https://www.youtube.com/watch?v=Zyfw1xxttdQ

Let’s begin:

Step- 1
Boot from Windows 7 DVD

Step- 2
Click Next

Step- 3
Click Repair Your Computer

Step- 4
Click Load Drivers and then click OK

Step- 5
Open the Computer system drive and follow instructions as mention below:

Find Utilman.exe from system32 and rename the file as Utilman_BK.exe the Utilman.exe patch: (C:\Windows\System32\Utilman.exe)

Copy cmd.exe file from System32 folder and paste into the system32 folder and change the cmd.exe file name as Utilman.exe

Step- 6
After load windows 7, Click from left side Ease of Access type in CMD as mention below:

net user (Press Enter you see the entire users list, now we reset the forgotten password)
net user mrcnit * (Press enter)
Put password abc*123 Enter and put confirm password abc*123 Press Enter Again

OR

You can active and change administrator password as mention below:

net user administrator /active:yes
net user administrator * (Enter and put password and confirm password)

If you don’t understand or you have any queries, please comments, we will try replying you ASAP.

Video Tutorial

CentOS 7.0 Download

CentOS-7.0-DownloadDownload CentOS 7.0 following mirrors should have the ISO images available:

Actual Country –

https://mirror.dhakacom.com/centos/7/isos/x86_64/
https://mirrors.ispros.com.bd/centos/7/isos/x86_64/

Nearby Countries –

https://centosmirror.go4hosting.in/centos/7/isos/x86_64/
https://mirror.nbrc.ac.in/centos/7/isos/x86_64/
https://ftp.iitm.ac.in/centos/7/isos/x86_64/
https://mirrors.163.com/centos/7/isos/x86_64/
https://mirrors.yun-idc.com/centos/7/isos/x86_64/
https://mirror.bit.edu.cn/centos/7/isos/x86_64/
https://centos.ustc.edu.cn/centos/7/isos/x86_64/
https://mirrors.aliyun.com/centos/7/isos/x86_64/
https://mirrors.sina.cn/centos/7/isos/x86_64/
https://mirror.neu.edu.cn/centos/7/isos/x86_64/
https://mirrors.cqu.edu.cn/CentOS/7/isos/x86_64/
https://mirrors.nwsuaf.edu.cn/centos/7/isos/x86_64/
https://mirrors.btte.net/centos/7/isos/x86_64/
https://mirrors.skyshe.cn/centos/7/isos/x86_64/
https://mirrors.opencas.cn/centos/7/isos/x86_64/
https://mirrors.pubyun.com/centos/7/isos/x86_64/
https://mirrors.zju.edu.cn/centos/7/isos/x86_64/
https://ftp.sjtu.edu.cn/centos/7/isos/x86_64/
https://mirror.vpshosting.com.hk/pub/linux/centos/7/isos/x86_64/
https://centos.uhost.hk/7/isos/x86_64/
https://mirror.sunnyvision.com/centos/7/isos/x86_64/
https://ftp.cuhk.edu.hk/pub/Linux/centos/7/isos/x86_64/
https://centos.01link.hk/7/isos/x86_64/
https://mirror.nus.edu.sg/centos/7/isos/x86_64/
https://mirror.vastspace.net/centos/7/isos/x86_64/
https://centos.usonyx.net/main/7/isos/x86_64/
https://mirror.vodien.com/centos/7/isos/x86_64/
https://mirror.vietoss.com/CentOS/7/isos/x86_64/
https://mirrors.vinahost.vn/centos/7/isos/x86_64/
https://mirror.digistar.vn/centos/7/isos/x86_64/
https://mirrors.viethosting.vn/centos/7/isos/x86_64/
https://mirrors.vonline.vn/centos/7/isos/x86_64/

Mirrors Verified Wed Aug 12 09:06:12 2015 UTC

Or use bittorrent to download the .torrent files provided.

Bittorrent is a peer to peer download system described at https://bittorrent.com/ and there are many clients available.

These include (in no particular order of preference): utorrent, vuze (Azureus), BitTorrent, Deluge, ctorrent, ktorrent, rtorrent and transmission.

Packaged copies of various torrent clients for CentOS can be found in the repositories listed in the following wiki article : https://wiki.centos.org/AdditionalResources/Repositories

CentOS 6.7 Download

CentOS-6.7-DownloadDownload CentOS 6.7  following mirrors should have the ISO images available:

Actual Country –

https://mirror.dhakacom.com/centos/6.7/isos/x86_64/

Nearby Countries –

https://mirror.nbrc.ac.in/centos/6.7/isos/x86_64/
https://ftp.sjtu.edu.cn/centos/6.7/isos/x86_64/
https://mirrors.aliyun.com/centos/6.7/isos/x86_64/
https://mirrors.pubyun.com/centos/6.7/isos/x86_64/
https://mirrors.sina.cn/centos/6.7/isos/x86_64/
https://centos.ustc.edu.cn/centos/6.7/isos/x86_64/
https://mirror.neu.edu.cn/centos/6.7/isos/x86_64/
https://mirrors.btte.net/centos/6.7/isos/x86_64/
https://mirrors.opencas.cn/centos/6.7/isos/x86_64/
https://mirrors.hustunique.com/centos/6.7/isos/x86_64/
https://mirrors.yun-idc.com/centos/6.7/isos/x86_64/
https://mirrors.zju.edu.cn/centos/6.7/isos/x86_64/
https://mirror.bit.edu.cn/centos/6.7/isos/x86_64/
https://mirrors.cqu.edu.cn/CentOS/6.7/isos/x86_64/
https://repo.virtualhosting.hk/centos/6.7/isos/x86_64/
https://centos.communilink.net/6.7/isos/x86_64/
https://ftp.cuhk.edu.hk/pub/Linux/centos/6.7/isos/x86_64/
https://centos.01link.hk/6.7/isos/x86_64/
https://centos.uhost.hk/6.7/isos/x86_64/
https://mirror.sunnyvision.com/centos/6.7/isos/x86_64/
https://mirror.nus.edu.sg/centos/6.7/isos/x86_64/
https://centos.usonyx.net/main/6.7/isos/x86_64/
https://mirror.vodien.com/centos/6.7/isos/x86_64/
https://mirror.digistar.vn/centos/6.7/isos/x86_64/
https://mirrors.viethosting.vn/centos/6.7/isos/x86_64/
https://mirrors.fibo.vn/centos/6.7/isos/x86_64/
https://mirror.vietoss.com/CentOS/6.7/isos/x86_64/
https://mirrors.vonline.vn/centos/6.7/isos/x86_64/
https://mirrors.vinahost.vn/centos/6.7/isos/x86_64/

Mirrors Verified Wed Aug 12 08:12:14 2015 UTC

Or use bittorrent to download the .torrent files provided.

Bittorrent is a peer to peer download system described at https://bittorrent.com/ and there are many clients available.

These include (in no particular order of preference): utorrent, vuze (Azureus), BitTorrent, Deluge, ctorrent, ktorrent, rtorrent and transmission.

Packaged copies of various torrent clients for CentOS can be found in the repositories listed in the following wiki article : https://wiki.centos.org/AdditionalResources/Repositories

Ubuntu 15.04 Download (Vivid Vervet)

Ubuntu-15.04-DownloadDesktop image

The desktop image allows you to try Ubuntu without changing your computer at all, and at your option to install it permanently later. This type of image is what most people will want to use. You will need at least 384MiB of RAM to install from this image.

There are two images available, each for a different type of computer:

64-bit PC (AMD64) desktop image
Choose this to take full advantage of computers based on the AMD64 or EM64T architecture (e.g., Athlon64, Opteron, EM64T Xeon, Core 2). If you have a non-64-bit processor made by AMD, or if you need full support for 32-bit code, use the i386 images instead.
32-bit PC (i386) desktop image
For almost all PCs. This includes most machines with Intel/AMD/etc type processors and almost all computers that run Microsoft Windows, as well as newer Apple Macintosh systems based on Intel processors. Choose this if you are at all unsure.

Server install image

The server install image allows you to install Ubuntu permanently on a computer for use as a server. It will not install a graphical user interface.

There are two images available, each for a different type of computer:

64-bit PC (AMD64) server install image
Choose this to take full advantage of computers based on the AMD64 or EM64T architecture (e.g., Athlon64, Opteron, EM64T Xeon, Core 2). If you have a non-64-bit processor made by AMD, or if you need full support for 32-bit code, use the i386 images instead.
32-bit PC (i386) server install image
For almost all PCs. This includes most machines with Intel/AMD/etc type processors and almost all computers that run Microsoft Windows, as well as newer Apple Macintosh systems based on Intel processors. Choose this if you are at all unsure.

snappy Ubuntu Core images

The snappy Ubuntu Core image allows you to install Ubuntu permanently on a computer, using the snappy transactional update system.

There are two images available, each for a different type of computer:

64-bit PC (AMD64) snappy image
Choose this to take full advantage of computers based on the AMD64 or EM64T architecture (e.g., Athlon64, Opteron, EM64T Xeon, Core 2). If you have a non-64-bit processor made by AMD, or if you need full support for 32-bit code, use the Intel x86 images instead.
ARMhf BeagleBone Black snappy image
For BeagleBone Black boards.

A full list of available files, including BitTorrent files, can be found below.

If you need help burning these images to disk, see the Image Burning Guide.

Ubuntu 14.04.3 LTS Download

Ubuntu-14.04.3-LTS-DownloadDesktop image

The desktop image allows you to try Ubuntu without changing your computer at all, and at your option to install it permanently later. This type of image is what most people will want to use. You will need at least 384MiB of RAM to install from this image.

There are two images available, each for a different type of computer:

64-bit PC (AMD64) desktop image
Choose this to take full advantage of computers based on the AMD64 or EM64T architecture (e.g., Athlon64, Opteron, EM64T Xeon, Core 2). If you have a non-64-bit processor made by AMD, or if you need full support for 32-bit code, use the i386 images instead.
32-bit PC (i386) desktop image
For almost all PCs. This includes most machines with Intel/AMD/etc type processors and almost all computers that run Microsoft Windows, as well as newer Apple Macintosh systems based on Intel processors. Choose this if you are at all unsure.

Server install image

The server install image allows you to install Ubuntu permanently on a computer for use as a server. It will not install a graphical user interface.

There are two images available, each for a different type of computer:

64-bit PC (AMD64) server install image
Choose this to take full advantage of computers based on the AMD64 or EM64T architecture (e.g., Athlon64, Opteron, EM64T Xeon, Core 2). If you have a non-64-bit processor made by AMD, or if you need full support for 32-bit code, use the i386 images instead.
32-bit PC (i386) server install image
For almost all PCs. This includes most machines with Intel/AMD/etc type processors and almost all computers that run Microsoft Windows, as well as newer Apple Macintosh systems based on Intel processors. Choose this if you are at all unsure.

A full list of available files, including BitTorrent files, can be found below.

If you need help burning these images to disk, see the Image Burning Guide.

Ubuntu 12.04.5 LTS Download

Ubuntu-12.04.5-LTS-DownloadDesktop CD

The desktop cd allows you to try Ubuntu without changing your computer at all, and at your option to install it permanently later. This type of cd is what most people will want to use. You will need at least 384MiB of RAM to install from this cd.

There are two images available, each for a different type of computer:

64-bit PC (AMD64) desktop CD
Choose this to take full advantage of computers based on the AMD64 or EM64T architecture (e.g., Athlon64, Opteron, EM64T Xeon, Core 2). If you have a non-64-bit processor made by AMD, or if you need full support for 32-bit code, use the i386 images instead.
32-bit PC (i386) desktop CD
For almost all PCs. This includes most machines with Intel/AMD/etc type processors and almost all computers that run Microsoft Windows, as well as newer Apple Macintosh systems based on Intel processors. Choose this if you are at all unsure.

Server install CD

The server install cd allows you to install Ubuntu permanently on a computer for use as a server. It will not install a graphical user interface.

There are two images available, each for a different type of computer:

64-bit PC (AMD64) server install CD
Choose this to take full advantage of computers based on the AMD64 or EM64T architecture (e.g., Athlon64, Opteron, EM64T Xeon, Core 2). If you have a non-64-bit processor made by AMD, or if you need full support for 32-bit code, use the i386 images instead.
32-bit PC (i386) server install CD
For almost all PCs. This includes most machines with Intel/AMD/etc type processors and almost all computers that run Microsoft Windows, as well as newer Apple Macintosh systems based on Intel processors. Choose this if you are at all unsure.

Alternate install CD

The alternate install cd allows you to perform certain specialist installations of Ubuntu. It provides for the following situations:

  • setting up automated deployments;
  • upgrading from older installations without network access;
  • LVM and/or RAID partitioning;
  • installs on systems with less than about 384MiB of RAM (although note that low-memory systems may not be able to run a full desktop environment reasonably).

In the event that you encounter a bug using the alternate installer, please file a bug on the debian-installer package.

There are two images available, each for a different type of computer:

64-bit PC (AMD64) alternate install CD
Choose this to take full advantage of computers based on the AMD64 or EM64T architecture (e.g., Athlon64, Opteron, EM64T Xeon, Core 2). If you have a non-64-bit processor made by AMD, or if you need full support for 32-bit code, use the i386 images instead.
32-bit PC (i386) alternate install CD
For almost all PCs. This includes most machines with Intel/AMD/etc type processors and almost all computers that run Microsoft Windows, as well as newer Apple Macintosh systems based on Intel processors. Choose this if you are at all unsure.

A full list of available files, including BitTorrent files, can be found below.

If you need help burning these images to disk, see the Image Burning Guide.

IBM to acquire Merge Healthcare in $1 billion deal

IBM-to-acquire-Merge-Healthcare-in-$1-billion-dealIBM said it would buy medical image company Merge Healthcare in a $1 billion deal and combine it with its newly formed health analytics unit, which is powered by its famous Watson supercomputer.

IBM plans to combine data and images from Merge Healthcare’s medical imaging management platform with Watson’s cloud-based healthcare computing system.

The system analyzes high volumes of data, understands complex questions posed in natural language and proposes evidence-based answers.

The deal will help physicians and researchers collate and analyze data such as patient’s medical and family history, data on others with similar symptoms and clinical research, trials and outcomes.

“Imaging is central to effective diagnosis and treatment…but it is increasingly important to share these images between providers to deliver high quality, cost-effective care,” Dougherty and Co analyst Brooks O’Neil wrote in a note.

IBM has been expanding aggressively in the healthcare IT sector. The Merge deal is the company’s third major health-related acquisition since launching the Watson Health unit in April.

“Organically, we will continue to build and invest from a research perspective in core technologies,” said Stephen Gold, vice president, IBM Watson.

“We will compliment and supplement that with acquisitions,” Gold told Reuters.

With this acquisition IBM will get access 7,500 US healthcare sites.

Merge Healthcare shareholders will get $7.13 per share at a premium of 31.8% to Wednesday’s close, the companies said.

Merge shares were trading at $7.08 by afternoon. IBM shares were little changed at $156.33.

The equity portion of the offer is valued at $713.1 million, according to Reuters calculations based on 100 million Merge Healthcare shares outstanding as of June 30.

Google, Samsung to issue monthly Android security fixes

Google,-Samsung-to-issue-monthly-Android-security-fixesGoogle and Samsung Electronics will release monthly security fixes for Android phones, a growing target for hackers, after the disclosure of a bug designed to attack the world’s most popular mobile operating system.

As of now, Android manufacturers get a monthly bulletin from Google in the form of point updates about security issues. However, Google will release these to the public through the Android open-source project; Nexus and Samsung users will receive security patches faster.

The first update from Google, which is already rolling out to Nexus devices (including Nexus 4, Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10 and Nexus Player) is aimed at fixing libStageFright issue — the security vulnerability that allows for remote code execution through text message.

Google has further said that it will offer major updates to Nexus devices for two years and provide security patches for three years “or 18 months from last sale of the device via the Google Store.”

However, Samsung did not provide such details about its security programme.