Recapitulating iNfernalBlog | Verse

Previous Part (Part-1)… Let’s get started into what I was getting to talk about, in the previous post, which was hosting this Ghost blog in AWS… I suppose you all know about how to create an AWS account, there’s absolutely no need write a tutorial about that. Lets get into setting up an EC2 instance …

Read more

Recapitulating iNfernalBlog | Intro

I’m actually not a tutorial/guide writer. But thought about writing this post anyways; for non-techies, so that you guys can run a Ghost Blog on AWS with Nginx reverse proxy (you obviously know that Ghost runs on Node.js), MariaDB and Let’s Encrypt. First things first. Lets start about when I started this blog and why… …

Read more

WordPress Security Glossary

As a WordPress website owner you have definitely thought about the security of your blogs and websites. Most probably you have also read a few articles about WordPress security, or how to secure your WordPress. Though if WordPress security is not your cup of tea, you failed to understand half of the terms used in …

Read more

Examples of Malicious PHP Codes

photo 1550645612 83f5d594b671

PHP is a powerful scripting language and it’s built in base64 encode/decode capabilities allow hackers to obfuscate their malicious code, which is quite effective at “hiding” what the function of the code is. In php sites such as WordPress, Joomla, Drupal (and many other CMS) base​64 encoding is a common technique implemented by hackers. This …

Read more