{"id":21458,"date":"2023-09-17T11:16:26","date_gmt":"2023-09-17T09:16:26","guid":{"rendered":"https:\/\/wpbeveiligen.nl\/?p=21458"},"modified":"2023-07-13T11:18:57","modified_gmt":"2023-07-13T09:18:57","slug":"how-do-you-stop-hackers","status":"publish","type":"post","link":"https:\/\/wpbeveiligen.nl\/en\/how-do-you-stop-hackers\/","title":{"rendered":"How do you stop hackers?"},"content":{"rendered":"

To stop hackers, you need to know what they do<\/strong>, where they log in<\/strong>, when they log in<\/strong>, and which files they modify<\/strong>.<\/p>\n

If you know what hackers do, you can revert their modifications, remove backdoors, and delete their accounts.<\/p><\/blockquote>\n

Know what hackers do<\/h2>\n

You can get a clear overview of all events with the WPB Antivirus<\/a> plugin.
\nThis is a comprehensive antivirus plugin for WordPress that records everything that happens on your website!<\/p>\n

An explanation of the log<\/h2>\n

Here, I will explain from left to right what you see and what you can do with that information to stop hackers.<\/p>\n

    \n
  1. First, you see what happened<\/strong>. This includes logins, text modifications, file modifications.
    \nIf you’re aware of what’s happening on your website in a timely manner, you can stop hackers in the early stages.<\/li>\n
  2. Then you see the timestamp<\/strong>. This allows you to determine if the modifications occur at times when you weren’t logged in.<\/li>\n
  3. The date<\/strong> is self-explanatory.<\/li>\n
  4. The IP address. You can click on it to directly go to a GEO website that shows you where that person is located<\/strong>. Russia, China, America… you can quickly tell if they are hackers. Hackers often use a proxy<\/em> (a fake location).
    \nYou can block the IP address so they can’t access your website anymore. (Security \u00bb Ban Users<\/em> in the plugin).<\/li>\n
  5. If it’s a user with a registered account, you see the name<\/strong>, so you know who did what. (Or which account was hacked)
    \nChange the password in that case.<\/li>\n
  6. In the example, it’s empty, but that’s where the requested URL<\/strong> is displayed. Sometimes you see files and pages that you didn’t even know existed!! (You can remove backdoors and unwanted files using an FTP program<\/a>)<\/li>\n
  7. This is also empty in the example, but here you see the destination location<\/strong> where a hacker ends up through their backdoor or page.<\/li>\n
  8. The details<\/strong> provide even more information if available.<\/li>\n
  9. Finally, on a scale of 1 to 10, you see the impact<\/strong> of an action.<\/li>\n<\/ol>\n

    Stopping a hacker<\/h2>\n

    Hackers and the scripts they write can be extremely fast and sophisticated.
    \nWe are actively involved in restoring and securing hacked WordPress websites every day.<\/p>\n

    That’s why we offer subscriptions where we restore and secure your website. With updates & guarantees!!<\/p><\/blockquote>\n

    This way, you pay a fixed monthly amount and never face surprises.<\/p>\n

    Want to proactively secure your WordPress website with a guarantee? Click here<\/a>.<\/p>\n

    Is your WordPress website already hacked? Don’t panic, we will restore your website and stop the hacker(s). Click here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

    To stop hackers, you need to know what they do, where they log in, when they log in, and which files they modify. If you know what hackers do, you can revert their modifications, remove backdoors, and delete their accounts. Know what hackers do You can get a clear overview of all events with the […]<\/p>\n","protected":false},"author":4,"featured_media":9628,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[184],"tags":[],"_links":{"self":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts\/21458"}],"collection":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/comments?post=21458"}],"version-history":[{"count":0,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts\/21458\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/media\/9628"}],"wp:attachment":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/media?parent=21458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/categories?post=21458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/tags?post=21458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}