Knowledge Base - OptionsResolve all of your questions in no time

  • General / Emulate CMS

    Using the option the system try to misguide the used WordPress by outputting the wrong traces, of the selected CMS. Misleading and making a false lead provide extra security, as the attacker search and attempt to hack something which not exist. The plugin can emulate systems like: Drupal – Drupal is a free and open-source […]

  • CDN – CDN Url

    This functionality is available for PRO version. A Content Delivery Network – CDN – is a network of servers located around the globe in fundamental spots with fast access. It takes a while for a web page to load especially if the server is located far away from the user. So they are designed to […]

  • General / CSS – Class/ ID replacement

    This functionality is available for PRO version.   This module is deprecated and replaced by Html/Css/JS Replacements   The module implement a post-processing engine, to provide additional functionality for Cascading Style Sheet data type. The  visual interface is self explanatory and the options are easy to understand for non technical persons. A requirement for post-processing […]

  • General / JavaScript – JS Variables Replace

    This functionality is available for PRO version.   This module is deprecated and replaced by Html/Css/JS Replacements   Through this module, commonly used JavaScript variables/functions from WordPress, plugins and theme can be renamed to something else. Often hackers boots parse and render the html in attempt to find specific variables which are widely used on […]

  • Admin – Change default run-ajax.php

    This functionality is available for PRO version The run-ajax.php is being used by WordPress core and many plugins to initiate AJAX calls from dashboard and front side. This is specific to WordPress, a site using such slug is an easy target to hack attempts.

  • Rewrite – Uploads

    The WordPress is not flexible at all when it come to media upload location. The default path is a standard format which appear like this, for any attachments (images, archives etc): <img class="alignnone size-full" src="" alt="" width="640" height="390" alt="" /> Viewing such a link, it’s pretty obliviously it’s a WordPress site, and the link points […]

  • Admin – Change wp-admin

    Despite the flexibility of WordPress framework, there are few ways to configure the admin login url customization for making a bit safer against unauthorized access and brute force attempts. All methods are not provided out of the box through WordPress core but require custom code to make it happen. Completely hide default WordPress admin url […]

  • Admin – Change wp-login.php

    Using the WordPress as CMS to manage your website it turns into a magnet for all brute force attempts to login, from boots and hackers. On CODEX there’s a dedicated page for such topic Brute Force Attacks it’s a very sensible area of your website and should get the appropriate attention from everyone. There are […]

  • General / Html – Scripts

    This section provides a way to control aspects of the front-side scripts loaded using the HTML script tag. An example of such a link: <script type=’text/javascript’ id=’jquery-framework’ src=’http://-domain-name-/wp-includes/js/jquery/jquery.js?ver=1.12.4′></script> Remove Version The option method helps to remove the JavaScript version number which is being appended at the end of every script file. Generally, the version number […]

  • General / Html – Styles

    This section provide methods to control the style links format being displayed on front side. An example of such link: <style rel=’stylesheet’ id=’id-of-style’ type=’text/css’ media=’all’ href=’http://-domain-name-/wp-content/themes/default/css/style.css?ver=1.12.4′></style> Remove Version   This provide a method to remove the Style file version number which is being append at the end of every style tag. Generally this is intended […]

Scroll to top