We are offering extremely secure VPS builds :

  • eNginx
  • Ubuntu
  • OpenVZ
  • Naxsi
  • Mod_Security
  • Fail2Ban
  • Country blocking
  • Over 200 customisations.

So – If you think :

I have no idea how to do it?

Looks too hard?

Nobody to help you?

Scared by the responsibility?

Scared by setup fees?

Spent months trying to understand the jargon?

Bewildered and overwhelmed?

Problem solved!

$50USD

Contact us

Sendy and Amazon are a match made on the internet – your own self-hosted autoresponder and the highest delivery rate mailer teamed to work for your business. Best of all – Under $90.

  • Sendy is currently $USD59
  • Amazon is free for 1 year
  • Our fee to install and setup everything $USD30

Contact us

You will need :

  • An Amazon account
  • Access to cPanel on your web host

Note: Obviously we will need access to these accounts to install your autoresponder. Once installed and tested, please change these credentials. We do NOT keep these details after the work is done and no customer information is kept on a server – we use old fashioned pencils and paper.

How to detect Malicious code in nulled or Free WordPress Themes and Plugins?

Apart from Official WordPress repository there are hundreds and thousands of websites which provides free WordPress themes and Plugins but the problem is you can not trust them always.

Yes, Most of them add a malicious code to themes and plugins which is not too easy for you to find out.

Before learning about the cure lets discuss about the cause.

Here is why they add their custom codes

~To get backlink from your blog unknowingly
~To get access to your blog
~To redirect your blog to spam links
~To add their advertisements and banners.
~To take your website down

Not only free themes and plugins also the premium nulled plugins and themes that you have download from DOWNLOAD and torrents may also infected by these malicious codes.

Yes, I too fell prey to these free plugins.Few days back, I was desperate to download a very famous nulled plugin from DOWNLOAD and after installing it in my blog I got to know that the plugin was infected and it redirects my blog to a spam blog.

I immediately disabled the plugin and checked for the code that caused the redirection in plugin files. After an hour I found the code and immediately removed it [ I don’t use that plugin now ]

This incident taught me very important thing.

Never trust nulled WordPress plugins and themes

However many of you might want to use those nulled or free plugins and themes for God’s Sake, If you are one of them then read the remaining article. After all we all in blackhat forum here…

Detecting Malicious codes

After downloading the plugin or theme,The first thing you should do is to check for virus,trojans and other worms that you may not like it.

Check for Virus and Trojans

Go to VirusTotal.com and upload the zip file to check for virus.

If your file is infected you will get a red signal and if not then you can move on to next step.

VT

Now lets check for unwanted codes in plugins using another WordPress plugin called Exploit Scanner,which can be securely downloaded from WordPress website.
http://wordpress.org/extend/plugins/exploit-scanner/

After installing it go to Dashboard >> Tools >> Exploit Scanner and run the scan.It will take some time to complete the scan and the time depends on number of plugins you have installed.

After the scan you can see a list of codes that are suspected.You can use the browser search function to find the plugins that you installed from outside WordPress repository.

 

TAC

Adding a backlink in a free theme is very common technique but you can easily find those exploited themes by the plugin called Theme Authenticity Checker (TAC).
>> https://wordpress.org/plugins/tac/

Install the plugin and go to Dashboard >> Appearance >> TAC

You can see the list of themes installed with their authenticity result.It will give a warning if any encrypted links are found in a theme.

 

TAC2

How are WordPress blogs hacked ?

WordPress blogs are hacked because of these four reasons

1.WebHost and your infected computer
2.Themes
3.Plugins
4.Passwords.

Note: If you interest, you can also read this pdf