Put on your trench coat and grab your magnifying glass as we walk through investigating a real-life hacked WordPress website. You’ll experience first-hand which tools can help you find the vulnerability and the point of entrance. Learn what the hacker might have left behind, how to seal up the most common problem areas, and how to set up notifications to help you spot a hack more quickly in the future. Even though we will be going through a WordPress website, most of the tools discussed are applicable to any website.
Beth Tucker Long is a PHP developer and co-organizer of Madison PHP. You can find her on Twitter https://twitter.com/e3BethT or on her blog http://www.alittleofboth.com. Beth is a firm believer in promoting community and mentoring. She runs Treeline Design, a web development company, and Playlist Event Music, a DJ company, along with her husband, Chris.
©2015, O'Reilly Media, Inc. • (800) 889-8969 or (707) 827-7019 • Monday-Friday 7:30am-5pm PT • All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. • firstname.lastname@example.org