How to recover a hacked WordPress website
2023/08/23Well it happened to you. You receive an email from a customer, or perhaps your web host : Your Wordpress…How to sanitize and reset all WordPress user accounts with linux shell scripting and wp-cli
2020/03/10Hello! There are several key best practices insofar as how to deal with security intrusions, including but not limited to…How to build a port scanner with Javascript using React Native
2019/03/26Hello! Why bother writing a port scanner in Javascript you might ask? Well javascript is many things, however the majority…How to cache queries to admin-ajax.php in WordPress to improve performance
2018/11/02Hello! Working with wordpress for a while now, we noticed that many actions, whether administrative in nature or building a…How to protect WordPress media files and only allow the users who uploaded them to view
2018/09/13Hello! In the past we have written about how to protect your Wordpress media files. In the past exercises we…How to implement a government ID verification system with Woocommerce and WordPress
2018/06/27Need this implemented on your site? Click here and fill out our quote form! Hello! There are many…#DeleteFacebook : How to poison, obfuscate and purge your facebook data before deleting your account
2018/03/28* Update : Thank you Vice for writing an article about my script! Unfortunately it seems as though facebook is…How to use Jenkins and Git to automate code pushes for your Laravel project
2018/02/07Hello! Recently we published guides how to push Wordpress sites with Jenkins or how to push Wordpress sites with a…How to craft an XSS payload to create an admin user in WordPress
2018/01/31Hello! XSS (or cross site scripting) attacks are a common method to maliciously execute actions against a website installation. In…WordPress plugin to integrate Jenkins to streamline your build process
2017/12/19Hello! We love integrating Jenkins into development workflow. Typically Jenkins would be used for custom development projects to streamline the…IP Address Reputation and intelligence plugin for WordPress
2017/08/31Hello! With Wordpress security, there are many methods for hardening and tightening controls, methods for preventing common attack vectors including…How to encrypt and execute your PHP code with MCRYPT or OPENSSL
2017/04/13Hello! While the scenario may not necessarily be common in which you would want to encrypt your PHP code and…How to use PHP as a web service to backup MySQL over HTTPS to a remote destination
2017/03/14Hello! Following with the theme of our last post, we thought it might be useful to demonstrate how to create…How to use PHP to recursively transfer files in parallel over HTTP
2017/03/03Hello! There may be some scenarios where you might want to clone your site or push files to a remote…WordPress plugin to display your portfolio in a full width grid
2016/12/13Hello! We just released a Wordpress plugin, Shift8 Portfolio, to organize your portfolio in a grid using bootstrap scaffolding! This…How to create a web interface to modify your AWS Security Group
2016/07/05Hello! On top of developing and designing websites for clients in and around Toronto, we also do managed and dedicated…Protect and lock down your WordPress media files
2016/05/13Hello! Occasionally it was necessary for us to lock down some or all of the Wordpress media library from public…Securing your MySQL queries from SQL injection in PHP
2015/06/22Hello! There is many strategies for securing your code against malicious user input. Some frameworks have checks and balances built…Use PHP to set up a RESTful API with simple authentication
2015/04/06Hello! It is sometimes necessary to bridge different web applications together in order to transmit or receive information and process…Tips to secure your WordPress site
2015/03/26Security is a huge deal. Sometimes your at the mercy of the open source solution or content management system that…Varnish, session cookies and WordPress
2014/10/21Hello! Caching is invariably the wave of the future. We have worked with many different caching technologies to leverage a…