This functionality is available for PRO version.
WordPress is the most popular CMS system, being used on over 37% of total sites, which is an astonishing achievement. There’s no doubt, WordPress is a unique framework, is a good and flexible core skeleton, a nice and easy to follow administrator dashboard interface. Not at least it provides a large base of free plugins and themes which conclude to incredible extensibility at the distance of a few mouse clicks.
But All that popularity comes with a huge price, all hackers are very active in finding security breaches in WordPress sites, as opening an exploit it reveal the vulnerability for all other sites using similar applications.
What is a Firewall?
A Firewall is a security piece of software that adds a layer of protection to your site. A firewall works as a rules-based filter for all incoming traffic to a website, it ensures only the secure traffic is reaching the server, all malicious attempts will be blocked and logged.
Why use a Firewall?
A Firewall works a Proactive ratter reactive security solution, so it helps to protect a website before the malicious and malware actually reach it. This is a huge improvement for security, as preventing any harm and damages for a site, spare the administrators of incalculable loses which the malware can do.
What the WP Hide Firewall can do?
The Firewall core is based on the well-known 7G Firewall solution used on a large number of servers. Is a lightweight code, a well-optimized set of rewrite rules, server-level protection against a wide type of malicious request, bad bots, automated attacks, spam, and other types.
Some of the firewall features are:
- Security via simplicity
- Extensive firewall protection
- Fine-tuned to minimize false positives
- Lightweight (only 12KB!), modular, flexible and fast
- Completely plug-&-play with no configuration required
- Improves security, reduces server load, and conserves resources
- Git/SVN friendly (does not block svn/git files et al)
- Better bad bot detection
Types of attacks and threats the firewall can stop:
- Directory Traversal
- HTTP Response Splitting
- (XSS) Cross-Site Scripting
- Cache Poisoning
- Dual-Header Exploits
- SQL/PHP/Code Injection
- File Injection/Inclusion
- Null Byte Injection
- Plugins exploits such as revslider, timthumb, fckeditor
- Exploits such as c99shell, phpshell, remoteview, site copier
How to activate the Firewall?
The feature works as an out-of-the-box solution, through the plugin Firewall interface the options need to be activated.
There is 2 type of firewall rules:
- Query String Rules
- Request URI Rules
The Query String Firewall module, scans the portion of a URL where data is passed to a server application and/or back-end database. The Request URI Rules, known as Uniform Resource Identifier, identifies the resource upon which to apply the filters.
The plugin interface includes a separate menu item for the firewall which can be used to control the active modules: