<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Web Archives - CVTF Studios.net</title>
	<atom:link href="https://cvtfstudios.net/category/portfolio/web/feed/" rel="self" type="application/rss+xml" />
	<link>https://cvtfstudios.net/category/portfolio/web/</link>
	<description>Webhosting in the city</description>
	<lastBuildDate>Wed, 30 Jun 2021 12:16:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>How to find and replace text with one click in your WordPress database</title>
		<link>https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/</link>
					<comments>https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 24 Apr 2016 12:01:29 +0000</pubDate>
				<category><![CDATA[Design]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[find and replace WP text]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3413</guid>

					<description><![CDATA[<p>    Last updated on April 21st, 2016 by Editorial Staff Share This Article Are you looking to do a mass search and replace in WordPress? Whether you want to find and replace a specific text, URL, or an image, you can easily do so by using a find and replace WordPress plugin or a  [...]</p>
<p>The post <a href="https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/">How to find and replace text with one click in your WordPress database</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="horizontalsocial" dir="LTR"> <img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-3414" src="https://cvtfstudios.net/wp-content/uploads/2016/04/find-and-replace-text-in-wordpress.png" alt="find-and-replace-text-in-wordpress" width="589" height="491" srcset="https://cvtfstudios.net/wp-content/uploads/2016/04/find-and-replace-text-in-wordpress-300x250.png 300w, https://cvtfstudios.net/wp-content/uploads/2016/04/find-and-replace-text-in-wordpress-500x417.png 500w, https://cvtfstudios.net/wp-content/uploads/2016/04/find-and-replace-text-in-wordpress.png 589w" sizes="(max-width: 589px) 100vw, 589px" /></div>
<p>&nbsp;</p>
<h6>Last updated on April 21st, 2016 by <a href="https://www.wpbeginner.com/author/wpbeginner/">Editorial Staff</a></h6>
<div id="horizontalsocial" dir="LTR">
<p>Share This Article</p>
</div>
<p>Are you looking to do a mass search and replace in WordPress? Whether you want to find and replace a specific text, URL, or an image, you can easily do so by using a find and replace WordPress plugin or a simple SQL query. In this article, we will show you how to find and replace text in your WordPress database.</p>
<h4 class="western">When You May Need Find &amp; Replace for WordPress Database?</h4>
<p>Let’s suppose that you have added specific text or URL to a number of your posts. You don’t know which posts you have added that text to, but you do know that there are a lot of them.</p>
<p>Now you can manually search your site and edit every single post one by one. That’s going to take time and has a high chance of you missing some occurrences.</p>
<p>Using a single command to automatically find and replace will do the same thing but much quicker and efficiently.</p>
<p>There is one downside to it though. If you made a mistake, then you will not be able to undo it. Once you replace the text, it is gone. You will need to carefully type the text you are looking for and the text you want to replace it with.</p>
<p>Having said that, let’s see how you can easily find and replace text in your WordPress database.</p>
<h4 class="western">Getting Started</h4>
<p>As we mentioned earlier that the changes you make to your database will not be reversible. You need to take every precaution to make sure that you don’t lose data.</p>
<p>First you need to create a WordPress database backup. You can do that by using a <a href="https://www.wpbeginner.com/plugins/7-best-wordpress-backup-plugins-compared-pros-and-cons/">WordPress backup plugin</a>. Alternatively, you can also create a <a href="https://www.wpbeginner.com/beginners-guide/how-to-make-a-wordpress-database-backup-manually/">database backup using phpMyAdmin</a>.</p>
<p>After creating the backup of your WordPress database, you can move on to run your find and replace commands.</p>
<h4 class="western">Running Find and Replace with a WordPress plugin</h4>
<p>If you are not familiar with code and don’t want to write a custom SQL query, then there is an easy to use find and replace WordPress plugin called <a href="https://wordpress.org/plugins/better-search-replace/" target="_blank" rel="noopener">Better Search Replace</a>.</p>
<p><img decoding="async" class="aligncenter" src="https://cdn2.wpbeginner.com/wp-content/uploads/2009/10/search-replace-db.png" alt="Better search replace plugin settings" width="520" height="466" name="graphics5" align="BOTTOM" border="0" /></p>
<p>It allows you to run search and replace commands from inside your WordPress admin area. We have a detailed guide on <a href="https://www.wpbeginner.com/plugins/search-and-replace-plugin-for-wordpress-database/">how to search and replace in WordPress with Better Search Replace plugin</a>.</p>
<h4 class="western">Running Find &amp; Replace MySQL Query with phpMyAdmin</h4>
<p>You can also use phpMyAdmin to find and replace text from your WordPress database.</p>
<p>First you need to login to cPanel dashboard of your <a href="https://www.wpbeginner.com/wordpress-hosting/">WordPress hosting</a>. Scroll down to the database section and then click on phpMyAdmin.</p>
<p><img decoding="async" class="aligncenter" src="https://cdn3.wpbeginner.com/wp-content/uploads/2016/04/phpmyadmin.png" alt="phpMyAdmin" width="520" height="177" name="graphics6" align="BOTTOM" border="0" /></p>
<p>The screenshot above is showing the cPanel dashboard on <a href="https://www.wpbeginner.com/refer/bluehost/" target="_blank" rel="noopener">BlueHost</a>. Your cPanel dashboard may look slightly different.</p>
<p>This will launch phpMyAdmin where you will need to click on your WordPress database name and then click on SQL.</p>
<p><img decoding="async" class="aligncenter" src="https://cdn.wpbeginner.com/wp-content/uploads/2016/04/phpmyadminsql.png" alt="Running SQL query in phpMyAdmin" width="520" height="259" name="graphics7" align="BOTTOM" border="0" /></p>
<p>You will need to enter your SQL query in this format:</p>
<p><code class="western">update</code> <code class="western">TABLE_NAME set</code> <code class="western">FIELD_NAME </code></p>
<p><code class="western">replace(FIELD_NAME, 'Text to find', 'text to replace with'); </code></p>
<p>For example, if you wanted to search for text in a WordPress post’s content, then you would write your query like this:</p>
<p><code class="western">update</code> <code class="western">wp_posts set</code> <code class="western">post_content</code></p>
<p><code class="western">replace(post_content,'Text to find','text to replace with');</code></p>
<p>Click on the ‘Go’ button to continue.</p>
<p>PhpMyAdmin will run your SQL query and upon success it will show the number of rows affected by the query.</p>
<p>You can now visit your WordPress site to see your changes in action.</p>
<p>We hope this article helped you learn how to find and replace text with one click in your WordPress database. You may also want to see our beginner’s guide on <a href="https://www.wpbeginner.com/beginners-guide/beginners-guide-to-wordpress-database-management-with-phpmyadmin/">WordPress database management with phpMyAdmin</a>.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&#038;title=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" data-a2a-url="https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/" data-a2a-title="How to find and replace text with one click in your WordPress database"></a></p><p>The post <a href="https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/">How to find and replace text with one click in your WordPress database</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fortinet SSH Backdoor Found In Firewalls</title>
		<link>https://cvtfstudios.net/3399-2/</link>
					<comments>https://cvtfstudios.net/3399-2/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 21 Apr 2016 12:35:29 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Fortinet SSH Backdoor Found In Firewalls]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3399</guid>

					<description><![CDATA[<p>    January 14, 2016 So the Fortinet SSH Backdoor, apparently it’s just a management authentication issue. Sorry, what’s that? It looks like a passphrase based admin level access login via SSH to me personally. Which is scary. They are adamantly shouting from rooftops that it was not planted by a 3rd party (NSA? Like  [...]</p>
<p>The post <a href="https://cvtfstudios.net/3399-2/">Fortinet SSH Backdoor Found In Firewalls</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="post-meta"><abbr class="date time published updated" title="2016-01-14T01:55:11+0800"> </abbr></div>
<section class="entry">
<p align="center"><img decoding="async" class="aligncenter" src="https://c2.staticflickr.com/2/1720/24332701546_d394b9b905.jpg" alt="Fortinet SSH Backdoor Found In Firewalls" /></p>
<p>&nbsp;</p>
<p><abbr class="date time published updated" title="2016-01-14T01:55:11+0800">January 14, 2016</abbr></p>
<p>So the Fortinet SSH Backdoor, apparently it’s just a management authentication issue. Sorry, what’s that? It looks like a passphrase based admin level access login via SSH to me personally.</p>
<p>Which is scary.</p>
<p>They are adamantly shouting from rooftops that it was not planted by a 3rd party (<a href="https://www.schneier.com/blog/archives/2015/12/back_door_in_ju.html">NSA? Like Juniper</a>..) or any kind of malicious activity.</p>
<blockquote><p>Enterprise security vendor Fortinet has attempted to explain why its FortiOS firewalls were shipped with hardcoded SSH logins.</p>
<p>It appears Fortinet’s engineers implemented their own method of authentication for logging-into FortiOS-powered devices, and the mechanism ultimately uses a secret passphrase. This code was reverse-engineered by persons unknown, and a Python script to exploit the hole emerged on the Full Disclosure mailing list this week.</p>
<p>Anyone who uses this script against vulnerable firewalls will gain administrator-level command-line access to the equipment. After some outcry on Twitter and beyond, Fortinet responded by saying it has already killed off the dodgy login system.</p>
<p>“This issue was resolved and a patch was made available in July 2014 as part of Fortinet’s commitment to ensuring the quality and integrity of our codebase,” a spokeswoman told El Reg.</p>
<p>“This was not a ‘backdoor’ vulnerability issue but rather a management authentication issue. The issue was identified by our product security team as part of their regular review and testing efforts. After careful analysis and investigation, we were able to verify this issue was not due to any malicious activity by any party, internal or external.”</p>
<p>In a security advisory dated today, Fortinet explained that the issue affects FortiOS versions 4.3.0 to 4.3.16 and 5.0.0 to 5.0.7. This covers FortiOS builds from between November 2012 and July 2014, and it’s certainly possible that some slack IT admins haven’t updated the software since then.</p></blockquote>
<div align="center"></div>
<p>It was actually patched by Fortinet in July 2014, but with edge devices like Firewalls – they don’t often get updated as it usually causes network downtime. So I’d guess there are plenty of firewalls out there very vulnerable to this, which basically gives you full admin access.</p>
<p>You can find the ‘exploit’ script in Python here: <a href="https://seclists.org/fulldisclosure/2016/Jan/26">SSH Backdoor for FortiGate OS Version 4.x up to 5.0.7</a></p>
<blockquote><p>It’s also possible that even if they did update in a timely fashion, their devices could have been breached before the fix was issued.</p>
<p>The login method is used by FortiManager, a tool for controlling any number of Fortinet devices from a central system.</p>
<p>If you are running older code and can’t upgrade, the firewall maker suggests a couple of workarounds. Managers can disable admin access via SSH and use the web interface instead, or the console browser applet for command-line access. If you really need SSH access, then version 5.x can restrict access to SSH to a minimal set of authorized IP addresses.</p>
<p>Whether you call it a backdoor or a “management authentication issue,” it’s still a pretty major issue for some sysadmins, and they are unlikely to be happy about the news.</p>
<p>One significant part of Fortinet’s statement was the assertion that this didn’t come from an external party. Ever since the Juniper backdooring security vendors have been at pains to avoid any suggestion that they are allowing intelligence agencies access to their products.</p>
<p>In the meantime, if you are using FortiOS then make sure the fimrware is up to date. The news of this hole will have the malicious hacking community aflutter and many are no doubt already scanning for vulnerable targets.</p></blockquote>
<p>There are some work arounds, what I’d personally like to see though is more transparency about the process and decisions made that led to this code being on production firewalls. How does this even happen?</p>
<p>And how did they only find it during scheduled review and testing? What kind of testing/QA/CI process do they have?</p>
<p>It all sounds rather fishy to me.</p>
<p>Source: <a href="https://www.theregister.co.uk/2016/01/12/fortinet_bakdoor/">The Register</a></p>
</section>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&#038;title=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" data-a2a-url="https://cvtfstudios.net/3399-2/" data-a2a-title="Fortinet SSH Backdoor Found In Firewalls"></a></p><p>The post <a href="https://cvtfstudios.net/3399-2/">Fortinet SSH Backdoor Found In Firewalls</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/3399-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Use SSH Pipes on Linux</title>
		<link>https://cvtfstudios.net/use-ssh-pipes-linux/</link>
					<comments>https://cvtfstudios.net/use-ssh-pipes-linux/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 20 Mar 2016 13:35:02 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[SSH Pipes on Linux]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3319</guid>

					<description><![CDATA[<p>Like most commands on Linux, SSH can be used with input/output redirection via |Unix Pipe. SSH can be used with this pipeline too. The basic concept here is understanding how the Unix pipeline works. When you understand the way pipes work, you can get seriously creative. This article covers what happens when you combine Unix  [...]</p>
<p>The post <a href="https://cvtfstudios.net/use-ssh-pipes-linux/">How to Use SSH Pipes on Linux</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter size-large wp-image-70749" src="https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-1024x830.png" alt="" width="1024" height="830" srcset="https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-177x142.png 177w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-200x162.png 200w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-300x243.png 300w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-400x324.png 400w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-500x406.png 500w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-600x487.png 600w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-700x568.png 700w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-800x649.png 800w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-1024x830.png 1024w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-1200x973.png 1200w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy.png 1344w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>Like most commands on Linux, SSH can be used with input/output redirection via <code>|</code>Unix Pipe. SSH can be used with this pipeline too. The basic concept here is understanding how the Unix pipeline works.<br />
When you understand the way pipes work, you can get seriously creative. This article covers what happens when you combine Unix pipes and SSH. It should be noted that since Unix pipes can be just about anything, there are no doubt going to be commands not on this list would also be useful.</p>
<h2 class="nolinks">Understanding the Unix Pipeline</h2>
<p>Pipes on Unix (and by extension, Linux) are used to chain programs together and make them work together. For example, using <code>cat</code>, you can show the contents of a file, but if you used a pipe, you could chain the <code>cat</code> command to the <code>more</code> command to make the file easier to read through.</p>
<div class="holsh-div">
<div class="bash">
<pre>cat file1 | more</pre>
</div>
</div>
<p>&nbsp;</p>
<p>The basic idea here is this: <code>program1 fileX | program2</code>. It’s not just limited to one file and two programs, though. Piping can get about as advanced as you need it to be with as many modifiers as you can think of.</p>
<p><strong>Note:</strong> Some types of pipes can be done without using the <code>|</code>. Some may use <code>&gt;</code> instead.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&#038;title=How%20to%20Use%20SSH%20Pipes%20on%20Linux" data-a2a-url="https://cvtfstudios.net/use-ssh-pipes-linux/" data-a2a-title="How to Use SSH Pipes on Linux"></a></p><p>The post <a href="https://cvtfstudios.net/use-ssh-pipes-linux/">How to Use SSH Pipes on Linux</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/use-ssh-pipes-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress 4.2.4 Security and Maintenance Release</title>
		<link>https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/</link>
					<comments>https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 04 Aug 2015 19:21:05 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[WP Security and Maintenance Release]]></category>
		<guid isPermaLink="false">http://www.cvtfradio.net/?p=2920</guid>

					<description><![CDATA[<p>WordPress 4.2.4 Security and Maintenance Release  Posted August 4, 2015 by Samuel Sidler. Filed under Releases, Security. WordPress 4.2.4 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. This release addresses six issues, including three cross-site scripting vulnerabilities and a potential SQL injection that  [...]</p>
<p>The post <a href="https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="fancy"><span style="color: #ff6600;"><a style="color: #ff6600;" href="https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a></span></h2>
<div class="meta"><img decoding="async" class=" aligncenter" src="https://1.bp.blogspot.com/_wICHhTiQmrA/Sfg33R1tfZI/AAAAAAAADko/HM3HTRYJlQg/s1600/help1.PNG" alt="" width="754" height="397" /></div>
<div class="meta"></div>
<div class="meta"></div>
<div class="meta"> Posted August 4, 2015 by <a href="https://profiles.wordpress.org/samuelsidler">Samuel Sidler</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>, <a href="https://wordpress.org/news/category/security/" rel="category tag">Security</a>.</div>
<div class="storycontent">
<p>WordPress 4.2.4 is now available. This is a<strong> security release</strong> for all previous versions and we strongly encourage you to update your sites immediately.</p>
<p>This release addresses six issues, including three cross-site scripting vulnerabilities and a potential SQL injection that could be used to compromise a site, which were discovered by <a href="https://sucuri.net/">Marc-Alexandre Montpas</a> of Sucuri, <a href="https://helenhousandi.com/">Helen Hou-Sandí</a> of the WordPress security team, <a href="https://www.checkpoint.com/">Netanel Rubin</a> of Check Point, and <a href="https://hackerone.com/reactors08">Ivan Grigorov</a>. It also includes a fix for a potential timing side-channel attack, discovered by <a href="https://www.scrutinizer-ci.com/">Johannes Schmitt</a> of Scrutinizer, and prevents an attacker from locking a post from being edited, discovered by <a href="https://www.linkedin.com/in/symbiansymoh">Mohamed A. Baset</a>.</p>
<p>Our thanks to those who have practiced <a href="https://make.wordpress.org/core/handbook/testing/reporting-security-vulnerabilities/">responsible disclosure</a> of security issues.</p>
<p>WordPress 4.2.4 also fixes four bugs. For more information, see the <a href="https://codex.wordpress.org/Version_4.2.4">release notes</a> or consult the <a href="https://core.trac.wordpress.org/log/branches/4.2?rev=33573&amp;stop_rev=33396">list of changes</a>.</p>
<p><a href="https://wordpress.org/download/">Download WordPress 4.2.4</a> or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.2.4.</p>
<p><em>Already testing WordPress 4.3? The second release candidate is now available (<a href="https://wordpress.org/wordpress-4.3-RC2.zip">zip</a>) and it contains these fixes. For more on 4.3, see <a href="https://wordpress.org/news/2015/07/wordpress-4-3-release-candidate/">the RC 1 announcement post</a>.</em></p>
<div class="sharedaddy sd-sharing-enabled">
<div class="robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing">
<h3 class="sd-title">Share this:</h3>
</div>
</div>
</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&#038;title=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" data-a2a-url="https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/" data-a2a-title="WordPress 4.2.4 Security and Maintenance Release"></a></p><p>The post <a href="https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Adding an Admin User to the WordPress Database via MySQL</title>
		<link>https://cvtfstudios.net/adding-an-admin-user-to-the-wordpress-database-via-mysql/</link>
					<comments>https://cvtfstudios.net/adding-an-admin-user-to-the-wordpress-database-via-mysql/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 01 Jun 2015 18:10:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[add user to dababase]]></category>
		<guid isPermaLink="false">http://www.cvtfradio.net/?p=2910</guid>

					<description><![CDATA[<p>How to Add an Admin User to the WordPress Database via MySQL             Few days ago, we ran into an issue where a user’s site got hacked and their admin account was deleted from the database. This locked them out of their site without any other entry. We went in  [...]</p>
<p>The post <a href="https://cvtfstudios.net/adding-an-admin-user-to-the-wordpress-database-via-mysql/">Adding an Admin User to the WordPress Database via MySQL</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>How to Add an Admin User to the WordPress Database via MySQL</p>
<p><img decoding="async" class="alignleft" src="https://cdn4.wpbeginner.com/blogposts/wpusersinsert.gif" alt="wp-users insert phpmyadmin table" width="520" height="201" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Few days ago, we ran into an issue where a user’s site got hacked and their admin account was deleted from the database. This locked them out of their site without any other entry. We went in to the phpMyAdmin and created a new admin user to grant them access. In this article, we will show you a step by step guide on how to create an admin user in WordPress Database via MySQL.</p>
<p>Note: You should always make a backup of your database before performing any MySQL edits. This tutorial requires basic understanding of how phpMyAdmin works.</p>
<p>First, you need to login to phpMyAdmin and locate your WordPress database.</p>
<p>Once inside phpMyAdmin;</p>
<p>Once you are in, we will be making changes to the wp_users and wp_usermeta tables. Lets go ahead and click on wp_users table.</p>
<p>phpMyAdmin wp_users table</p>
<p>We need to insert our new admin user’s information, so click on the Insert tab like it shows in the image above. In the insert form, add the following:</p>
<p>ID – pick a number (in our example, we will use the number 4).<br />
user_login – insert the username you want to use to access the WordPress Dashboard.<br />
user_pass – add a password for this username. Make sure to select MD5 in the functions menu (Refer to the screenshot below).<br />
user_nicename – put a nickname or something else that you would like to refer yourself as.<br />
user_email – add the email you want to associate with this account.<br />
user_url – this would be the url to your website.<br />
user_registered – select the date/time for when this user is registered.<br />
user_status – set this to 0.<br />
display_name – put the name you like to display for this user on the site (it can be your user_nicename value as well).<br />
Click on the Go Button</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&amp;linkname=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&amp;linkname=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&amp;linkname=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&amp;linkname=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&amp;linkname=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&amp;linkname=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fadding-an-admin-user-to-the-wordpress-database-via-mysql%2F&#038;title=Adding%20an%20Admin%20User%20to%20the%20WordPress%20Database%20via%20MySQL" data-a2a-url="https://cvtfstudios.net/adding-an-admin-user-to-the-wordpress-database-via-mysql/" data-a2a-title="Adding an Admin User to the WordPress Database via MySQL"></a></p><p>The post <a href="https://cvtfstudios.net/adding-an-admin-user-to-the-wordpress-database-via-mysql/">Adding an Admin User to the WordPress Database via MySQL</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/adding-an-admin-user-to-the-wordpress-database-via-mysql/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress Security Alert</title>
		<link>https://cvtfstudios.net/wordpress-security-alert/</link>
					<comments>https://cvtfstudios.net/wordpress-security-alert/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 13 Apr 2015 20:26:39 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Wordpress Security Alert]]></category>
		<guid isPermaLink="false">http://www.cvtfradio.net/?p=2271</guid>

					<description><![CDATA[<p>Wordpress Security Alert - WP Super cache Credit: Wikipedia Upgrade immediately ITWorld|April 8, 2015 Security firm Sucuri revealed on their blog this week that they had uncovered a persistent cross-site scripting vulnerability in the popular Wordpress plugin WP Super Cache. The effects of this vulnerability can be severe as an attacker can potentially insert malicious code  [...]</p>
<p>The post <a href="https://cvtfstudios.net/wordpress-security-alert/">WordPress Security Alert</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<header>
<h1>WordPress Security Alert &#8211; WP Super cache</h1>
</header>
<figure class="hero-img"><img decoding="async" src="https://images.techhive.com/images/article/2015/04/three_surveillance_cameras-100577821-primary.idge.jpg" alt="three surveillance cameras" /><figcaption> Credit: <a href="https://www.google.com/url?sa=i&amp;rct=j&amp;q=&amp;esrc=s&amp;source=images&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=0CAMQjxw&amp;url=ht" target="_blank" rel="nofollow">Wikipedia</a> </figcaption></figure>
<section class="deck">
<h2>Upgrade immediately</h2>
</section>
<div class="byline">
<p class="dateline">ITWorld<span class="divider">|</span>April 8, 2015</p>
</div>
<section class="bodee">
<div id="drr-container">
<p>Security firm <a href="https://sucuri.net/" target="new">Sucuri</a> revealed on their <a href="https://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html" target="new">blog this week</a> that they had uncovered a persistent <a href="https://en.wikipedia.org/wiki/Cross-site_scripting" target="new">cross-site scripting</a> vulnerability in the popular WordPress plugin<a href="https://wordpress.org/plugins/wp-super-cache/" target="new"> WP Super Cache</a>. The effects of this vulnerability can be severe as an attacker can potentially insert malicious code into WordPress pages without your knowledge. Anyone who has experienced this type of attack due to a plugin security flaw knows how difficult and time consuming remediation can be.</p>
<figure class="large "><img decoding="async" src="https://images.techhive.com/images/article/2015/04/supercache1-100577816-large.idge.png" alt="supercache1" width="620" height="123" /> <small class="credit">Cypress North</small></figure>
<p>WP Super Cache is deployed across all of the WordPress sites we host in our data center, and for good reason. The excellent plugin dramatically boosts the performance of WordPress sites while simultaneously reducing load on the web servers. The code for this plugin is mature and stable, rarely requiring updates. That&#8217;s part of the reason why it&#8217;s trusted by over 7 million websites. It&#8217;s popularity makes this security flaw a big concern for site owners.</p>
<figure class="medium "><img decoding="async" src="https://images.techhive.com/images/article/2015/04/supercache2-100577820-medium.idge.png" alt="supercache2" width="375" height="480" /> <small class="credit">Cypress North</small></figure>
<p>The update process is quick and easy so you should take the time to log in and click the update now link as soon as you&#8217;re able. If you&#8217;re fortunate enough to maintain your sites under a multi-site install you&#8217;ll be able to take care of this issue in one shot. Otherwise, like us, you&#8217;re stuck logging into each installation and manually updating each site like we spent all yesterday doing.</p>
<p>According to the blog post by <a href="https://blog.sucuri.net/author/marc" rel="author">Marc-Alexandre Montpas</a>:</p>
<blockquote><p>Using this vulnerability, an attacker using a carefully crafted query could insert malicious scripts to the plugin’s cached file listing page. As this page requires a valid nonce in order to be displayed, a successful exploitation would require the site’s administrator to have a look at that particular section, manually.</p></blockquote>
<p>The nonce requirement lowers the odds of the backdoor taking effect since the cached page gets purged periodically, but still, better safe than sorry. The scale of the vulnerable sites makes exploitation an inevitable event. Do your part to protect the web and get updating.</p>
</div>
</section>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&amp;linkname=WordPress%20Security%20Alert" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&amp;linkname=WordPress%20Security%20Alert" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&amp;linkname=WordPress%20Security%20Alert" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&amp;linkname=WordPress%20Security%20Alert" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&amp;linkname=WordPress%20Security%20Alert" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&amp;linkname=WordPress%20Security%20Alert" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-security-alert%2F&#038;title=WordPress%20Security%20Alert" data-a2a-url="https://cvtfstudios.net/wordpress-security-alert/" data-a2a-title="WordPress Security Alert"></a></p><p>The post <a href="https://cvtfstudios.net/wordpress-security-alert/">WordPress Security Alert</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/wordpress-security-alert/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress 4.0.1 Security Release</title>
		<link>https://cvtfstudios.net/wordpress-4-0-1-security-release/</link>
					<comments>https://cvtfstudios.net/wordpress-4-0-1-security-release/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 03 Oct 2014 09:54:13 +0000</pubDate>
				<category><![CDATA[Portfolio]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[WordPress 4.0.1 Security Release]]></category>
		<guid isPermaLink="false">http://spotlight.themerex.net/?p=1805</guid>

					<description><![CDATA[<p>Posted November 20, 2014 by Andrew Nacin. Filed under Releases, Security. WordPress 4.0.1 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately. Sites that support automatic background updates will be updated to WordPress 4.0.1 within the next few hours. If you  [...]</p>
<p>The post <a href="https://cvtfstudios.net/wordpress-4-0-1-security-release/">WordPress 4.0.1 Security Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="meta">Posted November 20, 2014 by <a href="https://nacin.com/">Andrew Nacin</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>, <a href="https://wordpress.org/news/category/security/" rel="category tag">Security</a>.</div>
<div class="storycontent">
<p>WordPress 4.0.1 is now available. This is a <strong>critical security release</strong> for all previous versions and we strongly encourage you to update your sites immediately.</p>
<p>Sites that support automatic background updates will be updated to WordPress 4.0.1 within the next few hours.</p>
<p>If you are still on WordPress 3.9.2, 3.8.4, or 3.7.4, you will be updated to 3.9.3, 3.8.5, or 3.7.5 to keep everything secure.</p>
<p>(We don’t support older versions, so please update to 4.0.1 for the latest and greatest.)</p>
<p>WordPress versions 3.9.2 and earlier are affected by a critical cross-site scripting vulnerability, which could enable anonymous users to compromise a site. This was reported by <a href="https://klikki.fi/">Jouko Pynnonen</a>. This issue does not affect version 4.0, but version 4.0.1 does address these eight security issues:</p>
<ul>
<li>Three cross-site scripting issues that a contributor or author could use to compromise a site. Discovered by <a href="https://joncave.co.uk/">Jon Cave</a>, <a href="https://www.miqrogroove.com/">Robert Chapin</a>, and <a href="https://johnblackbourn.com/">John Blackbourn</a> of the WordPress security team.</li>
<li>A cross-site request forgery that could be used to trick a user into changing their password.</li>
<li>An issue that could lead to a denial of service when passwords are checked. Reported by <a href="https://www.behindthefirewalls.com/">Javier Nieto Arevalo</a> and <a href="https://www.devconsole.info/">Andres Rojas Guerrero</a>.</li>
<li>Additional protections for server-side request forgery attacks when WordPress makes HTTP requests. Reported by Ben Bidner (vortfu).</li>
<li>An extremely unlikely hash collision could allow a user’s account to be compromised, that also required that they haven’t logged in since 2008 (I wish I were kidding). Reported by <a href="https://david.dw-perspective.org.uk">David Anderson</a>.</li>
<li>WordPress now invalidates the links in a password reset email if the user remembers their password, logs in, and changes their email address. Reported separately by <a href="https://twitter.com/MomenBassel">Momen Bassel</a>, <a href="https://c0dehouse.blogspot.in/">Tanoy Bose</a>, and <a href="https://managewp.com/">Bojan Slavković of ManageWP</a>.</li>
</ul>
<p>Version 4.0.1 also fixes 23 bugs with 4.0, and we’ve made two hardening changes, including better validation of EXIF data we are extracting from uploaded photos. Reported by <a href="https://www.securesolutions.no/">Chris Andrè Dale</a>.</p>
<p>We appreciated the <a href="https://codex.wordpress.org/FAQ_Security">responsible disclosure</a> of these issues directly to our security team. For more information, see the <a href="https://codex.wordpress.org/Version_4.0.1">release notes</a> or consult the <a href="https://core.trac.wordpress.org/log/branches/4.0?rev=30475&amp;stop_rev=29710">list of changes</a>.</p>
<p><a href="https://wordpress.org/download/">Download WordPress 4.0.1</a> or venture over to <strong>Dashboard → Updates</strong> and simply click “Update Now”.</p>
<p><em>Already testing WordPress 4.1? The second beta is now available (<a href="https://wordpress.org/wordpress-4.1-beta2.zip">zip</a>) and it contains these security fixes. For more on 4.1, see <a href="https://wordpress.org/news/2014/11/wordpress-4-1-beta-1/">the beta 1 announcement post</a>.</em></p>
</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&amp;linkname=WordPress%204.0.1%20Security%20Release" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&amp;linkname=WordPress%204.0.1%20Security%20Release" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&amp;linkname=WordPress%204.0.1%20Security%20Release" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&amp;linkname=WordPress%204.0.1%20Security%20Release" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&amp;linkname=WordPress%204.0.1%20Security%20Release" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&amp;linkname=WordPress%204.0.1%20Security%20Release" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-0-1-security-release%2F&#038;title=WordPress%204.0.1%20Security%20Release" data-a2a-url="https://cvtfstudios.net/wordpress-4-0-1-security-release/" data-a2a-title="WordPress 4.0.1 Security Release"></a></p><p>The post <a href="https://cvtfstudios.net/wordpress-4-0-1-security-release/">WordPress 4.0.1 Security Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/wordpress-4-0-1-security-release/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Zero-Day Vulnerability Discovered in TimThumb Script</title>
		<link>https://cvtfstudios.net/how-to-get-outstanding-urban-night-photographs-2/</link>
					<comments>https://cvtfstudios.net/how-to-get-outstanding-urban-night-photographs-2/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 03 Oct 2014 09:51:21 +0000</pubDate>
				<category><![CDATA[Media]]></category>
		<category><![CDATA[Portfolio]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[New Zero-Day Vulnerability]]></category>
		<guid isPermaLink="false">http://spotlight.themerex.net/?p=1803</guid>

					<description><![CDATA[<p>WordPress Security Alert: New Zero-Day Vulnerability Discovered in TimThumb Script Sarah Gooding June 25, 2014 20 photo credit: kama17 – cc Security vulnerabilities have plagued the TimThumb script for years. It is most commonly used in cropping, zooming and resizing images in WordPress themes. After the large scale attacks launched against the script a few  [...]</p>
<p>The post <a href="https://cvtfstudios.net/how-to-get-outstanding-urban-night-photographs-2/">New Zero-Day Vulnerability Discovered in TimThumb Script</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<header class="entry-header">
<h1 class="entry-title font-headlines">WordPress Security Alert: New Zero-Day Vulnerability Discovered in TimThumb Script</h1>
<div class="entry-byline font-secondary"><span class="entry-author"><a class="url fn n" title="Posts by Sarah Gooding" href="https://wptavern.com/author/sarah" rel="author">Sarah Gooding</a></span> <time class="entry-published updated" title="Wednesday, June 25, 2014, 2:48 pm" datetime="2014-06-25T14:48:35-05:00">June 25, 2014</time> <a class="comments-link" title="Comment on WordPress Security Alert: New Zero-Day Vulnerability Discovered in TimThumb Script" href="https://wptavern.com/wordpress-security-alert-new-zero-day-vulnerability-discovered-in-timthumb-script#comments">20</a></div>
</header>
<div class="entry-content">
<figure id="attachment_25334" class="wp-caption aligncenter" style="width: 719px; text-align: justify;"><figcaption class="wp-caption-text font-secondary">photo credit: <a href="https://www.flickr.com/photos/kama17/9279705214/">kama17</a> – <a href="https://creativecommons.org/licenses/by/2.0/">cc</a></figcaption></figure>
<p style="text-align: justify;">Security vulnerabilities have <a href="https://wptavern.com/timthumb-vulnerability-bites-another-victim" target="_blank">plagued</a> the <a href="https://timthumb.googlecode.com/svn/trunk/timthumb.php" target="_blank">TimThumb</a> script for years. It is most commonly used in cropping, zooming and resizing images in WordPress themes. After the <a href="https://blog.sucuri.net/2011/08/attacks-against-timthumb-php-in-the-wild-list-of-themes-and-plugins-being-scanned.html" target="_blank">large scale attacks</a> launched against the script a few years ago, one might think that theme and plugin developers would be less likely to continue building with it. However, this is not the case and many websites are again in danger, according to the exploit <a href="https://cxsecurity.com/issue/WLB-2014060134" target="_blank">disclosure</a> issued today.</p>
<p style="text-align: justify;">TimThumb 2.8.13 has a vulnerability with its “Webshot” feature that, when enabled, allows attackers to execute commands on a remote website. At this time there is no patch. Security experts at Sucuri <a href="https://blog.sucuri.net/2014/06/timthumb-webshot-code-execution-exploit-0-day.html" target="_blank">break down the threat</a> as follows: <strong>“With a simple command, an attacker can create, remove and modify any files on your server.”</strong></p>
<p style="text-align: justify;">Although the Webshot feature should be disabled by default, Sucuri recommends that you check your timthumb file to make sure it’s disabled. Search for “WEBSHOT_ENABLED” and verify that it’s set to “false,” as shown below:</p>
<div id="highlighter_314875" class="syntaxhighlighter nogutter taverncode " style="text-align: justify;">
<div class="lines">
<div class="line alt1">
<table>
<tbody>
<tr>
<td class="content"><code class="plain">define (‘WEBSHOT_ENABLED’, false);</code></td>
</tr>
</tbody>
</table>
</div>
</div>
</div>
<p style="text-align: justify;">This vulnerability affects many WordPress themes, plugins, and third party components. According to the disclosure, all themes from <a href="https://themify.me/" target="_blank">Themify</a> utilize this script, as well as several plugins, including <a href="https://wordpress.org/plugins/wordpress-gallery-plugin/" target="_blank">WordPress Gallery Plugin</a> and the <a href="https://wordpress.org/plugins/igit-posts-slider-widget/" target="_blank">IGIT Posts Slider Widget</a>.</p>
<p style="text-align: justify;">It’s important to recognize that your theme or plugin may also use this script, even if it’s not listed in the disclosure. If you’ve ever lost an entire weekend fixing client sites that fell victim to TimThumb exploits, then you know that disabling the WebShot option is probably a good idea. This is a simple thing that you can do now to prevent your sites from getting hacked.</p>
<div id="better-author-bio-div">
<div class="better-author-bio-div-info"><img decoding="async" id="grav-d12f506a8f9afba443178608fc9e2232-0" class="avatar avatar-60 photo grav-hashed grav-hijack" src="https://1.gravatar.com/avatar/d12f506a8f9afba443178608fc9e2232?s=60&amp;d=&amp;r=R" alt="" width="60" height="60" /></p>
<h4 class="font-headlines" style="text-align: justify;">Who is Sarah Gooding</h4>
<p class="better-author-bio-div-meta" style="text-align: justify;">Sarah Gooding is an Editorial Ninja at Audrey Capital. When not writing about WordPress, she enjoys baking, knitting, judging beer competitions and spending time with her Italian Greyhound.</p>
</div>
</div>
</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&amp;linkname=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&amp;linkname=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&amp;linkname=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&amp;linkname=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&amp;linkname=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&amp;linkname=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fhow-to-get-outstanding-urban-night-photographs-2%2F&#038;title=New%20Zero-Day%20Vulnerability%20Discovered%20in%20TimThumb%20Script" data-a2a-url="https://cvtfstudios.net/how-to-get-outstanding-urban-night-photographs-2/" data-a2a-title="New Zero-Day Vulnerability Discovered in TimThumb Script"></a></p><p>The post <a href="https://cvtfstudios.net/how-to-get-outstanding-urban-night-photographs-2/">New Zero-Day Vulnerability Discovered in TimThumb Script</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/how-to-get-outstanding-urban-night-photographs-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Web Security Issues</title>
		<link>https://cvtfstudios.net/web-security-issues/</link>
					<comments>https://cvtfstudios.net/web-security-issues/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 03 Oct 2014 09:49:57 +0000</pubDate>
				<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[Web Security Issues]]></category>
		<guid isPermaLink="false">http://spotlight.themerex.net/?p=1801</guid>

					<description><![CDATA[<p>A serious vulnerability in the WP eCommerce Plugin was announced within the last 24 hours (321st Oct 2014) . A fix has been released and some hosting companies are already auto-upgrading customers to the newest version. Upgrade to 3.8.14.4 of WP eCommerce immediately if you use this plugin. Please spread the word because with almost  [...]</p>
<p>The post <a href="https://cvtfstudios.net/web-security-issues/">Web Security Issues</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p id="yui_3_16_0_1_1416864681517_48384">A serious vulnerability in the <a class="yiv4485711366valid-link yiv4485711366validation-enabled yiv4485711366validating" href="https://clicks.aweber.com/y/ct/?l=FLnrU&amp;m=3kDg7Km37O6aApy&amp;b=0ptQiJ6leDcIw2mMKUw6kg" target="_blank" rel="nofollow">WP eCommerce Plugin</a> was announced within the last 24 hours (321st Oct 2014) . A fix has been released and some hosting companies are already auto-upgrading customers to the newest version.</p>
<p id="yui_3_16_0_1_1416864681517_48387">Upgrade to 3.8.14.4 of WP eCommerce immediately if you use this plugin. Please spread the word because with almost 3 million downloads this is a very popular plugin.</p>
<p id="yui_3_16_0_1_1416864681517_48390"><strong id="yui_3_16_0_1_1416864681517_48389"><a id="yui_3_16_0_1_1416864681517_48388" class="yiv4485711366valid-link yiv4485711366validation-enabled yiv4485711366validating" href="https://clicks.aweber.com/y/ct/?l=FLnrU&amp;m=3kDg7Km37O6aApy&amp;b=lF4QGQud_ZQEoo5ZAytSMA" target="_blank" rel="nofollow">Details on our blog&#8230;</a></strong></p>
<p id="yui_3_16_0_1_1416864681517_48391"><strong>​</strong></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&amp;linkname=Web%20Security%20Issues" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&amp;linkname=Web%20Security%20Issues" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&amp;linkname=Web%20Security%20Issues" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&amp;linkname=Web%20Security%20Issues" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&amp;linkname=Web%20Security%20Issues" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&amp;linkname=Web%20Security%20Issues" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&#038;title=Web%20Security%20Issues" data-a2a-url="https://cvtfstudios.net/web-security-issues/" data-a2a-title="Web Security Issues"></a></p><p>The post <a href="https://cvtfstudios.net/web-security-issues/">Web Security Issues</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/web-security-issues/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to upgrade to SSL certificates from SHA1 to SHA2</title>
		<link>https://cvtfstudios.net/upgrade-to-ssl-certificates-from-sha1-to-sha2/</link>
					<comments>https://cvtfstudios.net/upgrade-to-ssl-certificates-from-sha1-to-sha2/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 03 Oct 2014 09:46:48 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[How to upgrade to SSL certificates from SHA1 to SHA2]]></category>
		<guid isPermaLink="false">http://spotlight.themerex.net/?p=1795</guid>

					<description><![CDATA[<p>With Chrome version 39 which is in the process of being released (see footnote), Google has started issuing warnings if a website is using a certificate that has a signature algorithm that uses the older and less secure SHA1. To find out which signature algorithm your secure website is using, in Chrome click on the green  [...]</p>
<p>The post <a href="https://cvtfstudios.net/upgrade-to-ssl-certificates-from-sha1-to-sha2/">How to upgrade to SSL certificates from SHA1 to SHA2</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter  wp-image-70788" src="https://cvtfstudios.net/wp-content/uploads/2014/10/sha1-to-sha2.jpeg" alt="" width="1132" height="294" srcset="https://cvtfstudios.net/wp-content/uploads/2014/10/sha1-to-sha2-200x52.jpeg 200w, https://cvtfstudios.net/wp-content/uploads/2014/10/sha1-to-sha2-300x78.jpeg 300w, https://cvtfstudios.net/wp-content/uploads/2014/10/sha1-to-sha2-400x104.jpeg 400w, https://cvtfstudios.net/wp-content/uploads/2014/10/sha1-to-sha2-450x117.jpeg 450w, https://cvtfstudios.net/wp-content/uploads/2014/10/sha1-to-sha2.jpeg 474w" sizes="(max-width: 1132px) 100vw, 1132px" /></p>
<p>With Chrome version 39 which is in the process of being released (see footnote), Google has started issuing warnings if a website is using a certificate that has a signature algorithm that uses the older and less secure SHA1.</p>
<p>To find out which signature algorithm your secure website is using, in Chrome click on the green lock in the location bar. Then click on ‘connection’, then click on ‘certificate information’. You should see something like the image below. Note the ‘Signature algorithm’ is SHA-256 which is one of the SHA2 hashing functions. If you see SHA-1, you need to immediately reissue your certificate using SHA-2 and install the new version.</p>
<p>&nbsp;</p>
<p>So what does it look like in the new version of Chrome when you’re using SHA-1? This is taken from a well known website that has not upgraded yet. Notice the lock with the warning triangle in the location bar. This is the main indication for a site visitor that something is awry. If you then click on the lock it has a further warning with explanation.</p>
<p>&nbsp;</p>
<p>If you do have a website that is using SHA-1, don’t panic. Just sign into GoDaddy or whoever your SSL issuer is. Then go to manage your certificates and they’ll have an option there to reissue your certificate. You’ll need to resubmit your certificate signing request (CSR) but you can just resubmit your old CSR and it will work fine.</p>
<p>Then make sure that you’ve selected SHA-2 or SHA-256 or another <a href="https://en.wikipedia.org/wiki/SHA-2">SHA-2 compatible function</a>. Then reissue the certificate. In GoDaddy’s case it takes about a minute for them to approve your request. If you have an EV certificate it may take longer.</p>
<p>Please share this with other site administrators to make sure that their customers aren’t getting warnings when visiting those all-important secure pages.</p>
<p><strong>Footnote</strong>: Chrome 39 has <a href="https://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html">officially been pushed into the “Stable” channe</a>l which is the release channel. It will be pushed out via auto-update to millions of customers in the coming days. The demo above was done with Chrome 40 beta, but what the user sees is identical.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&amp;linkname=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&amp;linkname=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&amp;linkname=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&amp;linkname=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&amp;linkname=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&amp;linkname=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&#038;title=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" data-a2a-url="https://cvtfstudios.net/upgrade-to-ssl-certificates-from-sha1-to-sha2/" data-a2a-title="How to upgrade to SSL certificates from SHA1 to SHA2"></a></p><p>The post <a href="https://cvtfstudios.net/upgrade-to-ssl-certificates-from-sha1-to-sha2/">How to upgrade to SSL certificates from SHA1 to SHA2</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/upgrade-to-ssl-certificates-from-sha1-to-sha2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
