Knowledge Base - OptionsResolve all of your questions in no time

  • General / Html User Interactions

    Through the User Interactions interface, different types of user actions are possible to block. This helps to limit the interaction between the user and its browser on your website. The following options are available: Disable Mouse right click Disable Text Selection Disable Copy Disable Cut Disable Paste Disable Print Disable Print Screen Disable Developer Tools […]

  • General / Html Emulate CMS

    Using the option the system tries to misguide the used WordPress by outputting the wrong traces, of the selected CMS. Misleading and making a false lead provide extra security, as the attacker search and attempt to hack something which not exist. The plugin can emulate systems like: Drupal – Drupal is a free and open-source […]

  • CDN – CDN Url

    This functionality is available for PRO version. A Content Delivery Network – CDN – is a network of servers located around the globe in fundamental spots with fast access. It takes a while for a web page to load especially if the server is located far away from the user. So they are designed to […]

  • General / CSS – Class/ ID replacement

    This functionality is available for PRO version.   This module is deprecated and replaced by Html/Css/JS Replacements   The module implement a post-processing engine, to provide additional functionality for Cascading Style Sheet data type. The  visual interface is self explanatory and the options are easy to understand for non technical persons. A requirement for post-processing […]

  • General / JavaScript – JS Variables Replace

    This functionality is available for PRO version.   This module is deprecated and replaced by Html/Css/JS Replacements   Through this module, commonly used JavaScript variables/functions from WordPress, plugins and theme can be renamed to something else. Often hackers boots parse and render the html in attempt to find specific variables which are widely used on […]

  • Admin – Change default run-ajax.php

    This functionality is available for PRO version The run-ajax.php is being used by WordPress core and many plugins to initiate AJAX calls from dashboard and front side. This is specific to WordPress, a site using such slug is an easy target to hack attempts.

  • Rewrite – Uploads

    The WordPress is not flexible at all when it come to media upload location. The default path is a standard format which appear like this, for any attachments (images, archives etc): <img class="alignnone size-full" src="" alt="" width="640" height="390" alt="" /> Viewing such a link, it’s pretty obliviously it’s a WordPress site, and the link points […]

  • Admin – Change wp-admin

    Despite the flexibility of WordPress framework, there are few ways to configure the admin login url customization for making a bit safer against unauthorized access and brute force attempts. All methods are not provided out of the box through WordPress core but require custom code to make it happen. Completely hide default WordPress admin url […]

  • Admin – Change wp-login.php

    Using the WordPress as CMS to manage your website it turns into a magnet for all brute force attempts to login, from boots and hackers. On CODEX there’s a dedicated page for such topic Brute Force Attacks it’s a very sensible area of your website and should get the appropriate attention from everyone. There are […]

  • General / Html – Scripts

    This section provides a way to control aspects of the front-side scripts loaded using the HTML script tag. An example of such a link: <script type=’text/javascript’ id=’jquery-framework’ src=’http://-domain-name-/wp-includes/js/jquery/jquery.js?ver=1.12.4′></script> Remove Version The option method helps to remove the JavaScript version number which is being appended at the end of every script file. Generally, the version number […]

Scroll to top