Hov. Du er ikke logget ind.
DU SKAL VÆRE LOGGET IND, FOR AT INTERAGERE PÅ DENNE SIDE

the largest distributed brute force attack

Side 2 ud af 2 (13 indlæg)
Fra Viborg
Tilmeldt 24. Sep 10
Indlæg ialt: 737
Fra  Webdesign, Niels Madsen Skrevet kl. 22:21
Hvor mange stjerner giver du? :

Martin Thorborg:
Tilsyneladende fordi der var et affiliatelink i mailen.

 Hej Martin.

Så vidt jeg kan se, er der ikke nogen affillate links til denne side, kommer kun ind på Wordfence forside med et kort som viser:

You're watching Wordfence protect WordPress Sites in Real-Time

Mvh. Niels

https://itwebsite.dk

Fra Skodsborg
Tilmeldt 24. Mar 05
Indlæg ialt: 12315
Fra  Amino ApS Hotel Klippen Skrevet kl. 22:29
Hvor mange stjerner giver du? :

Niels Madsen:

Martin Thorborg:
Tilsyneladende fordi der var et affiliatelink i mailen.

 Hej Martin.

Så vidt jeg kan se, er der ikke nogen affillate links til denne side, kommer kun ind på Wordfence forside med et kort som viser:

You're watching Wordfence protect WordPress Sites in Real-Time

Mvh. Niels

Flere har anmeldt det, er ikke selv ekspert på det.

De bedste hilsner

Martin

 

Fra Viborg
Tilmeldt 24. Sep 10
Indlæg ialt: 737
Fra  Webdesign, Niels Madsen Skrevet kl. 18:57
Hvor mange stjerner giver du? :
Gennemsnit 5,0 stjerner givet af 1 person

Hej Venner.

Der en ny attack på vej  i dag på Wordpress:

Mvh. Niels

We're seeing an unusually large WordPress attack underway. Our automated alert system triggered and posted to FB and Twitter earlier today. The attack is visible on http://www.wordfence.com/ and as you can see it is peaking at 40,000 attacks per minute currently. Normal attack frequency is around 2000 attacks per minute.

The attack started at 7:30 AM Pacific Time this morning. It is still underway. The nature of the attack is a large botnet that is generating a huge number of failed WordPress login attempts. 

We recommend ensuring that all your WordPress admin accounts are using strong passwords, that you have Wordfence installed and the number of login failures set to 20 or less on the Wordfence options page. 

You should have "Count login failures over what time period" set to 5 minutes and "Amount of time a user is locked out" set to 1 hour. An hour may not seem like much, but it will effectively defeat a password guessing attack. 

We also recommend you enable "Participate in the Real-Time WordPress Security Network" because this will immediately lock out any attacks from the Botnet that is responsible for the current attack.

Please share this info if you have friends and colleagues that use WordPress to ensure they stay safe and secure.

https://itwebsite.dk

Side 2 ud af 2 (13 indlæg)