{"id":200,"date":"2006-12-13T05:15:39","date_gmt":"2006-12-13T11:15:39","guid":{"rendered":"https:\/\/blog.mhvt.net\/?p=200"},"modified":"2009-01-11T08:00:45","modified_gmt":"2009-01-11T16:00:45","slug":"wordpress-introducing-simple-anti-spam-measures","status":"publish","type":"post","link":"https:\/\/blog.mhvt.net\/?p=200","title":{"rendered":"WordPress &#8211; Introducing Simple Anti-Spam Measures"},"content":{"rendered":"<p><a href=\"http:\/\/www.wordpress.org\/\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.mhvt.net\/quicktime\/graphics\/icons\/wordpress.jpg\" height=\"120\" width=\"120\" alt=\"WordPress\" \/><\/a><br \/>\n<br \/><\/br><br \/>\n<br \/><\/br><br \/>\nHosting a blog isn&#8217;t so easy.  For blog owners, security has been a serious concern.  Nowadays, cyber criminals use zombie computers to post spam messages with links to undesirable websites.  As for WordPress, there are simple measures that blog administrators can take to reduce the growing tendency of spam attacks.  <!--more--><\/p>\n<p>This video tutorial quickly goes over some of the basic WordPress options to increase blog security.  We then introduce three plug-ins for more.  These anti-spam security plug-ins are designed for WordPress, but some of them can also be installed in other popular PHP scripts including Coppermine Photo Gallery and phpBB.<\/p>\n<p>So where do these cyber criminals come from?  Some of the ones that cause trouble at this blog come from Western Europe, Eastern Europe and Russia.  Furthermore, the worst thing you can do concerning blog security is to leave the site unattended.  If the site is unattended and you are going to leave comment spammers freely accessible, they will take it over and use it for phishing.  If that happens, the hosting company will often charge you hundreds of dollars more for cleaning up the mess.<br \/>\n<br \/><\/br><br \/>\n<br \/><\/br><br \/>\n<a href=\"http:\/\/www.mhvt.net\/quicktime\/eng\/screenshots\/wp_spam_security_1.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.mhvt.net\/quicktime\/eng\/screenshots\/wp_spam_security_1.jpg\" height=\"165\" width=\"220\" alt=\"WordPress anti spam\" \/><\/a> <a href=\"http:\/\/www.mhvt.net\/quicktime\/eng\/screenshots\/wp_spam_security_2.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.mhvt.net\/quicktime\/eng\/screenshots\/wp_spam_security_2.jpg\" height=\"165\" width=\"220\" alt=\"WordPress anti spam\" \/><\/a><br \/>\n<br \/><\/br><br \/>\n<br \/><\/br><\/p>\n<li>VTC version: 1.0<\/li>\n<li>Video length: 6 minutes 18 seconds<\/li>\n<li>Video format: QuickTime<\/li>\n<li>Video compression: H.264<\/li>\n<li>Video resolution: 720 x 540 pixels<\/li>\n<li>Audio commentary: Not available<\/li>\n<p><\/br><br \/>\n<br \/><\/br><\/p>\n<table width=\"440\" border=\"0\" cellpadding=\"0\" cellspacing=\"0\">\n<tr>\n<td width=\"200\"><a href=\"http:\/\/forums.mhvt.net\/index.php?topic=39.0\"><img decoding=\"async\" src=\"machouse\/video_tutorials_visitors.gif\" alt=\"Mac video tutorials\" \/><\/a><\/td>\n<td>&nbsp;<\/td>\n<td width=\"200\"><a href=\"http:\/\/www.mhvt.net\/quicktime\/eng\/vtc\/web_hosting\/wp_spam_security.php\"><img decoding=\"async\" src=\"machouse\/video_tutorials_members.gif\" alt=\"Mac video tutorials\" \/><\/a><\/td>\n<\/tr>\n<\/table>\n<p>Please read <a href=\"http:\/\/www.mhvt.net\/quicktime\/eng\/terms_guests.php\">Terms of Use for Guests<\/a> before watching any of the video tutorials.<br \/>\n<br \/><\/br><br \/>\n<br \/><\/br><br \/>\nThe WordPress Blog is a product of WordPress.Org.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hosting a blog isn&#8217;t so easy. For blog owners, security has been a serious concern. Nowadays, cyber criminals use zombie computers to post spam messages with links to undesirable websites. As for WordPress, there are simple measures that blog administrators &hellip; <a href=\"https:\/\/blog.mhvt.net\/?p=200\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":342,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-200","post","type-post","status-publish","format-standard","hentry","category-internet-security"],"_links":{"self":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts\/200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/users\/342"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=200"}],"version-history":[{"count":0,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=\/wp\/v2\/posts\/200\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mhvt.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}