Updated WordPress Security Tips (markdown)
@@ -94,4 +94,23 @@ Most administrative users login to their blog via the same IP address. By whitel
|
|||||||
|
|
||||||
**23. Use a strong password**
|
**23. Use a strong password**
|
||||||
|
|
||||||
|
**24. Review the Headers sent by your Webserver**
|
||||||
|
You should always review the HTTP Headers sent by your Webserver and limit them to a minimum.
|
||||||
|
To check your Headers you can execute the following command and check the output.
|
||||||
|
```
|
||||||
|
curl -skI http://www.domain.com
|
||||||
|
```
|
||||||
|
|
||||||
|
As an example, PHP sends it's version information in a header. To disable this, add or uncomment the following line in your php.ini:
|
||||||
|
```
|
||||||
|
expose_php = Off
|
||||||
|
```
|
||||||
|
|
||||||
|
If you are running apache, you can also minimize the info sent about your Webserver. You should edit the file `/etc/apache2/conf.d/security` and set the following values:
|
||||||
|
```
|
||||||
|
ServerTokens Prod # Only show Server: Apache
|
||||||
|
ServerSignature Off # Remove internal information
|
||||||
|
TraceEnable Off # Disable trace method
|
||||||
|
```
|
||||||
|
|
||||||
**For further WordPress hardening tips see: [http://codex.wordpress.org/Hardening_WordPress](http://codex.wordpress.org/Hardening_WordPress)**
|
**For further WordPress hardening tips see: [http://codex.wordpress.org/Hardening_WordPress](http://codex.wordpress.org/Hardening_WordPress)**
|
||||||
Reference in New Issue
Block a user