I've had this issue myself and there is a simple way to do this, although it's not well documented. Simply add the following comment to the HTML of your page, post or custom post type to hide the Digg Digg floating share bar:
<!-- Digg Digg Disabled -->Continue reading
I spend a good bit of my time writing content for my various websites. Logging into each separate WordPress or Joomla instance can be time consuming and annoying - as good as web interfaces have become they are still no where near as responsive as a good desktop app.
Being a Mac user there aren’t that many fantastic options for blogging software. I’ve tried MarsEdit and a few others and was a little bit less than impressed.
One of my big requirements is the use of the WordPress Media Manager rather than having to upload images via FTP and inserting the images (even if the app does this automatically it breaks thumbnails and forces me to log in to the admin which defeats the purpose.
So what are my requirements for desktop blogging software? Here’s my short list:
That’s really about all that I require. Now I’ve been using MacJournal for all of about 5 minutes here and I’m relatively impressed. I especially like the full screen edit. It removes any distractions and allows me to focus on the content I am writing rather than the Skypes, MSNs, Tweets, Emails and Facebook Updates.
I’m going to plug away with this software for a little bit and test out the image and media handling. Do you use desktop blogging software? Let me know if you have any MacJornal tips and tricks or suggestions for other desktop blogging software.Continue reading
In the last few days the Gumblar malware injection attack has been making the rounds and hopefully you've taken preventitive measures to ensure that you are as safe as you can be from this annoying injection attack.
Just so you're aware the reason for this attack is Blackhat SEO spammers are attempting to insert a hidden link on your site for the purposes of link building. The problem is it's not only illegal, it's incredibly lame.
Here's another scenario, let's assume for a second that your site did in fact get hijacked. Likely what you will be left with is an annoying script in a tond of your WordPress site pages. Not just in your theme but in anything beneath wp-content that they could inject.
This might include:
Your only solution at that point is to reinstall WP (thus over writing the compromised files), re uploading your theme (backup!) and reinstalling all of your plugins. That would then get every file restored.
Now that's a time consuming and lengthy pain in the ass process to be honest. So let's be a bit proactive and add some functionality to your WordPress site that will automate some of these things for you.
Here's a list of trusted management, backup and resoration plugins I use on all my sites:
In general people do not like to think about things like backups. It's not a very sexy subject to say the least. But from my experience there is nothing worse than having to weed through a mass of files, downtime, and just the frustration of repairing things.
These backups can make a bad experience like getting injected relatively painless. It's a bit of a "set it and forget it" scenario.
If this is your first visit here you might want to have a look at my other WordPress Security and SEO Posts
All the best,
Looks like there is another WordPress exploit out there dubbed Gumblar .cn - I was actually made aware of it through a pingback from Growmap.com on their: Watch Out for Recent WordPress Gumblar PHP Exploit post.
These attacks are extremely time consuming to clean up, trust me I've had to do it before in the past. It's not a quick or easy thing to have to deal with at all.
There is also an excellent explanation of Gumblar here: Gumblar .cn Exploit - 12 Facts About This Injected Script
Please proactively protect yourself against this exploit!
Update: I'm quoting a bit from Scansafe's excellent Q&A about the exploit:
Is this a cross-site scripting (XSS) attack?
No. The compromises appear to be the result of stolen FTP credentials and direct manipulation of files on the Web server.
What is the intent of the malware distributed through the Gumblar compromised websites?
The malcode distributed via the compromised websites attempts to exploit PDF and Flash exploits in order to deliver malware that redirects infected users’ search engine results. In these particular attacks, the malcode appears to be targeting Internet Explorer users and Google search. In addition, the gumblar.cn malcode installs a backdoor that connects to 22.214.171.124 – an IP address of a known botnet command and control that has historically been associated with malware engaged in malicious redirections.
Reference blog post: http://blog.scansafe.com/journal/2009/5/8/google-serps-redirections-turn-to-bots.html
How do these malicious redirections work?
Similar to a man-in-the-middle attack, these redirections occur as a result of a man-in-the-browser attack. The malcode injects itself into the browser process, monitors the requests processed by the browser, and injects fraudulent traffic. In the case of the Google SERPs redirects, the malcode replaces legitimate Google SERPs results with links pointing to malicious or fraudulent websites.
Millions of websites have been compromised over the past year; what makes these particular compromises unique?
A typical series of website compromises reaches peak within the first week or so and subsequently begins declining in intensity as detection is added by signature vendors, user awareness increases, and website operators begin cleaning the affected sites. (This is why attackers are constantly pushing new waves of compromise).
In the gumblar.cn attacks, the opposite is occurring. As website operators attempt to clean up the original compromise or otherwise make changes to the original source code of the .htm, .php, and .asp pages on their sites, the gumblar.cn compromise is injected. The gumblar.cn mal-script appears to be dynamically generated and thus varies not only from site to site, but also from page to page on the same site. In addition, the resulting mal-script is heavily obfuscated, further hampering signature detection methods. As a result, the gumblar.cn compromises are increasing – up 188% from last week and a 61% increase from yesterday.
Here are some related articles I've written that might be helpful:
Best of Luck,
When you use WordPress for a corporate or business website, security always comes up as an issue and for good reason. In what has turned into an ongoing series on WordPress Security I'm going to review a few very useful plugins which will add an additional layer of security to your WordPress or WordPress MU site.
In addition to this article, you might find the two other posts in this series useful:
So here is the added list of extremely useful WordPress plugins, all of them work well with both WordPress and WordPress MU (on my sites at least):
Now keep in mind that these will not ensure that you will never have a security issue on your blog or website. But as the saying goes an ounce of prevention is worth a pound of cure (Benjamin Franklin was a pretty smart guy so I'm going with it).
I hope you've found these plugins useful. Let me know if you've got any additional plugins or techniques you use to secure your sites and ensure smooth sailing!
After my last article on Cleaning your Site after a WordPress Injection Attack I figure that it's time to take the old "an ounce of prevention us better than a pound of a cute" (or something like that). So here is a nice easy way to enhance your Akismet spam protection and quickly and easily blacklist an offending IP.
Personally I get really sick of blog spammers, especially since my blog is DoFollow. It doesn't stand for the same thing as DoSpam. Very annoying time consuming and potentially harmful - alot of these same idiots who blog spam would also be the same people who will try to inject your WordPress theme and plugins with Click Counter code.
Anyhow in this post I'm going to use the following plugins:
The first thing you need to do is install all of the above plugins and ensure each of them work. As a side note: I had trouble with WP-EasyBan on WordPress 2.7.1 but I corrected it. To be honest I am not 100% sure if it was a conflicting plugin issue or a core problem with WP-EasyBan. If you have a problem, contact me or comment here and I will share my fix (I wasn't able to see "Add Ban" in the user menu but a few changes to the plugin fixed it without any issue).
Ok moving right along.
Let's say you are getting a substantial amount of Spam in your Spam Bin in Akismet. You will easily be able to tell if it comes from one particular IP address. First go to your Spam Box and identify the IP address - see below:
Next step: Check your Security logs under "Tools -> Security Logs" - now if the person is simply annoying you can skip that step but the Security logs will identify if the user is on a blacklist:
Once you've done that it's time to "Add Ban" provided by WP-EasyBan. It's got a great interface for you to add various options. We want to add a specific IP address (adding a block if IP's could cause you to block legit visitors to your site.
Also as an ounce of prevention you can set a time limit and maybe you'll discourage the blog spammers after a period of time. The reason I like this method is that Spammers never give up unless they are certain that their stuff is not getting through. Blacklisting will let you send a message that there is no getting through to you.
As a last note: I like to add a personalized message to these idiots. Sometime I venture into more colourful language depending on how badly one IP is offending my site and messing with my hard work.
Then you can set another site to redirect them to as well. Get creative here you can have fun with this, there is also a sense of satisfaction to mess around with these people.
Anyone else have any tips? Let me know!
I am pretty active on LinkedIn and have been for quite some time. I really do my best to try to answer one question per week and participate heavily in that community. It’s a good way to connect with others, make contacts and also use it as a sounding board for input to my ideas and thoughts on SEO, Search Marketing, Internet Marketing and what I do for a living both with Honeypot Marketing and with my own projects.
I figure since I am posting there I should also share some that with this audience. So the question that was posed from LinkedIn was this:
“How can you calculate the ROI of further SEO Investments for online project? Is there a model that can be used?“
That is a darned fine question since typical ROI models do not stand up well when it comes to SEO and Organic Search for a couple of reasons:
Given those two factors I’ve come up with a fairly decent model that I find works and here for your viewing pleasure is the overview. If you disagree with me or if you think I’m wrong then register and comment or email me.
One of the key things to consider is that calculating ROI on Organic Search is different than traditional media. Here is the layout I utilize:
A Total Amount of Search Traffic
B Total Amount of Converting Search
C Conversion Rate from Search
C Life Time Value of a Conversion (is it CPA or LTV)
D Converting Terms (focus on these)
Determine total Search Traffic = 1000
Determine the Converting Search Ratio: B/A (10/100) = 0.10
Use the Total Converting Search Numbers = 100
Determine the value of the Conversion: C = $200
You have profited $20,000 from organic search.
Total current budget : Link Building $1500 per month plus other monies spent (I am not sure what these are)/
Your profit of $20,000 from all search engine optimization programs is being generated by $1500 of spend to acquire 200 customers. Your cost per customer is $7.50
Your spend is generating a 13:1 profit to cost ratio. Now you know your budget to work with and you can shift your overall tactics to increase the overall number search joins as you wish.
I’ve used this model (with much more detail) successfully in the past on numerous projects in the online gambling industry including online sportsbooks, casinos, generic ecommerce sites, online dating, lead generation and ebook marketing industries. It provides for a strong ROI model, justifies SEO budgets and keeps the business people happy since they understand what the goals of the program really are.
I would love to get your input, comments and suggestions on expanding the ROI model for Search Engine Optimization. Please comment below and let know, even if you think I'm completely wrong!
March 4, 2009 Update: My plan has worked out very well and everything is back to normal without too much of an interruption. My request for Google site review took a total of 12 hours and it was completely handled through Google Webmaster Tools. Google spidered the entire site for about 6 hours checking every existing page on the site from Mountain View California. Around 6pm EST I was given a new notice in my Webmaster Control panel that the notice would be removed with the next update which took place about 90 minutes later.
I'd like to thanks a few people who gave me some good advice. If this does happen to you make sure that you:
I woke up this morning ready to get to work and as per usual I check my sites indexes in Google, Yahoo and MSN. Even though it's a beautiful sunny day outside I was shocked to see the following:
Bad News for Tuesday Morning to be sure. So the question is what do I do and how do I get this bad message off my Search Listing?
I'm not too concerned to be honest except for the fact that my site is vulnerable to this injection attack. I would love to smack the hacker that instituted this attack.
So first things first:
What is this message all about? Well when I viewed the source of my site I saw what is called an obsfucated injection attack on the footer of every single one of my pages. This is a bit of a pain since I am using WordPress MU with a number of plugins.
That means that the hackers could have injected their little code block into my theme, my plugins into the core WordPress MU files. Not a pretty thought to have to go through all of those areas to remove these individual code blocks. Bottom line: my site got hacked. What steps do I take to repair the damage that's been done?
My plan to remove the PHP injection attack:
That's my plan. I am about half way through it but there are some serious issues at play here since it is not only Google which is tagging my site as malicious (bad for business!). Check out the number of blocks which exist:
Google Malicious Message:
I'm not Malicious but Google thinks I am so next step is to click on the SERP that's when Firefox jumps in:
After clicking the SERP Firefox jumps in and says I am an attack site. How fascinating but just wait. It's not over yet when I get to the site:
Firefox toolbar warning
So clearly the powers that be and the tools on my computer are working hard to identify malicious sites. It is very clear that this site could be malicious and even though it was through no intent on my part the bottom line is that my site was hacked and turned into an attack site. This is a good line of warnings to any user and in the time frame that I am repairing the site and hardening my WordPress to ensure this does not happen again I don't really mind having these messages there.
They are good for users.
Update - Twitter just sent me the source of this injection attack:
Uh oh! We found a bad apple in your Twitter feed.
We detected a link in your account pointing to a phishing site or other harmful material that we identified as malware. Here's the troublesome post:
"@BlogDuJour hey there try out my blog [ your unsafe link was here ] - I am in the process of redesigning now but should be back to normal soon!"
March 02, 2009 22:07
We removed this update from Twitter. Please be mindful of others in the Twitter community, and post only safe links on Twitter.com.
Thanks! Twitter Support
Just thought I would let you all know that I've made this blog do follow. Now remember - real comments only please but they will pass link authority.
As I am going through this resurrection of my site I've had the opportunity to rethink a few thinks in terms of categories, tags, URL structure, Sub Domain structure and in particular making all comments DoFollow.
Having said that I installed the DoFollow plugin yesterday for a few reasons:
Having said that I am curious. Is your blog a DoFollow blog?
Over the pas months I've had excellent success in building online reputation through Do Follow blogs. Here is a fantastic list from Squidoo of categorized list of Do Follow blogs.
I'll be updating this page with more Do Follow resources.Continue reading