educational

Hardening Sites by Obfuscating File Structures

When it comes to improving adult website security, sophisticated software, expensive hardware and other means are often employed; but budget-conscious operators can use a bit of strategy to harden their sites by obfuscating common directory and file structures, as well as other simple tricks that amount to a free and easy means of increasing security.

Fundamental to this process is understanding the basic strategy being used: as many hackers look for certain files or folders that either have vulnerabilities to known exploits, or reveal details about the software, systems and services that a targeted web server uses, simply changing the name, location or “permissions” of certain files leaves hackers with questions, rather than answers.

... simply changing the name, location or “permissions” of certain files leaves hackers with questions, rather than answers.

For example, WordPress is often pointed to as being “insecure,” but this is akin to the Windows operating system being “insecure,” if for no other reason than the most popular products make the most popular targets. In this case, WordPress installations by default use the “wp_” database prefix — the presence of which clearly identifies the underlying technology platform and opens the doors to automated MySQL injection attacks.

This vulnerability can easily be addressed by using a different database prefix, which is hopefully not readily guessable such as “sitename_” or another obvious point of attack. While not an impenetrable barrier, this simple measure blocks a substantial number of attacks — especially random assaults, where a specific site is not targeted, but rather, any site that a malicious payload stumbles upon and can infect.

Moving the wp_config.php file up one level from its normal directory structure and setting its file permissions to 400 or 440 is another recommended hardening measure that handily illustrates the process that webmasters should go through on their own websites.

Is there a particular filename or path that identifies your site’s workings? Are version numbers visible, or used within the HTML code, such as within the “meta generator” tag? These are clues that hackers seek when attempting to compromise a website.

Related:  

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

profile

VerifyMy Seeks to Provide Frictionless Online Safety, Compliance Solutions

Before founding VerifyMy, Ryan Shaw was simply looking for an age verification solution for his previous business. The ones he found, however, were too expensive, too difficult to integrate with, or failed to take into account the needs of either the businesses implementing them or the end users who would be required to interact with them.

Alejandro Freixes ·
opinion

How Adult Website Operators Can Cash in on the 'Interchange' Class Action

The Payment Card Interchange Fee Settlement resulted from a landmark antitrust lawsuit involving Visa, Mastercard and several major banks. The case centered around the interchange fees charged to merchants for processing credit and debit card transactions. These fees are set by card networks and are paid by merchants to the banks that issue the cards.

Jonathan Corona ·
opinion

It's Time to Rock the Vote and Make Your Voice Heard

When I worked to defeat California’s Proposition 60 in 2016, our opposition campaign was outspent nearly 10 to 1. Nevertheless, our community came together and garnered enough support and awareness to defeat that harmful, misguided piece of proposed legislation — by more than a million votes.

Siouxsie Q ·
opinion

Staying Compliant to Avoid the Takedown Shakedown

Dealing with complaints is an everyday part of doing business — and a crucial one, since not dealing with them properly can haunt your business in multiple ways. Card brand regulations require every merchant doing business online to have in place a complaint process for reporting content that may be illegal or that violates the card brand rules.

Cathy Beardsley ·
profile

WIA Profile: Patricia Ucros

Born in Bogota, Colombia, Ucros graduated from college with a degree in education. She spent three years teaching third grade, which she enjoyed a lot, before heeding her father’s advice and moving to South Florida.

Women In Adult ·
opinion

Creating Payment Redundancies to Maximize Payout Uptime

During the global CrowdStrike outage that took place toward the end of July, a flawed software update brought air travel and electronic commerce to a grinding halt worldwide. This dramatically underscores the importance of having a backup plan in place for critical infrastructure.

Jonathan Corona ·
opinion

The Need for Minimal Friction in Age Verification Technology

In the adult sector, robust age assurance, comprised of age verification and age estimation methods, is critical to ensuring legal compliance with ever-evolving regulations, safeguarding minors from inappropriate content and protecting the privacy of adults wishing to view adult content.

Gavin Worrall ·
opinion

Account-to-Account Payments: The New Banking Disruptor?

So much of our industry relies upon Visa and Mastercard to support consumer payments — and with that reliance comes increased scrutiny by both brands. From a compliance perspective, the bar keeps getting raised until it feels like we end up spending half our time making sure we are compliant rather than growing our business.

Cathy Beardsley ·
profile

WIA Profile: Samantha Beatrice

Beatrice credits the sex positivity of Montreal for ultimately inspiring her to pursue work in adult entertainment. She had many friends working in the industry, from sex workers to production teams, so it felt like a natural fit and offered an opportunity to apply her marketing and social media savvy to support people she truly believes in and wants to see succeed.

Women In Adult ·
opinion

Understanding the Latest Server Processors

Over the last decade, we mostly stopped talking about CPU performance. Recently, however, there has been a seismic and exciting change in the CPU landscape, due to innovation by a chip company called Advanced Micro Devices (AMD).

Brad Mitchell ·
Show More