So how do you stop your WordPress site from being. Follow our guide on how to secure your WordPress site.

Force SSL Usage

To protect against data being intercepted use SSL themes nulled WordPress to access the admin area of the blog. Forcing WordPress to use SSL is possible but not all hosting services allow you to use SSL. Once you’ve checked that your Web server can handle SSL, simply open your wp-config.phpfile (located at the root of your WordPress installation), and paste the following:

define(‘FORCE_SSL_ADMIN’, true);

Use.htaccess to protect the wp-config File

The wp-config.php is one of the most important files on your blog. This file contains all of the information required to access your precious database: username, password, server name and so on. Protecting the wp-config.php file is critical.

The .htaccess file is located at the root your WordPress installation. Open it up, and paste the following code ALWAYS CREATE A BACKUP OF THIS FILE BEFORE EDITING:

order allow,deny

deny from all

How the code works

.htaccess files are powerful and one of the best tools to prevent unwanted access to your files. In this code, we have simply created a rule that prevents any access to the wp-admin.php file, thus ensuring that no evil bots can access it.

Protect Your WordPress Blog from Script Injections

Masterman Enterprises always protects GET and POST requests, but sometimes this is not enough. You should also protect your blog against script injections and any attempt to modify the PHP GLOBALS and _REQUESTvariables.

The code below blocks script injections and any attempts to modify the PHP GLOBALS and _REQUEST variables. Paste it in your .htaccess file ALWAYS CREATE A BACKUP OF THIS FILE BEFORE EDITING.

Options +FollowSymLinks

RewriteEngine On

RewriteCond %{QUERY_STRING} (<|%3C).script.(>|%3E) [NC,OR]

RewriteCond %{QUERY_STRING} GLOBALS(=|[|%[0-9A-Z]{0,2}) [OR]

RewriteCond %{QUERY_STRING} _REQUEST(=|[|%[0-9A-Z]{0,2})

RewriteRule ^(.*)$ index.php [F,L]

What the code above is checking whether the request contains a