Forum Replies Created

Viewing 9 replies - 1 through 9 (of 9 total)
  • Esmi’s advice was definitely helpful. I found out that one of my plugins was hindering the JavaScript operation.

    Thread Starter abehjat

    (@abehjat)

    Here are some useful commands/information for anyone interested in targeting some files

    Locate files modified on December 31, 2013 at 4:17 GMT. The command for such hack can be found at:

    touch("wp-optionstmp.php", mktime(12, 17, 11, 12, 31, 2013));

    Some hacks occurred on this date: October 25 2013

    Weird hack involving auth and humungous base64 code

    $auth_pass = "63a9f0ea7bb98050796b649e85481845";
    $default_charset = 'Windows-1251';

    Find files between certain times

    find public_html/ -newermt 2013-10-25 ! -newermt 2013-10-26 -ls

    Find files affected by hacks

    grep -rnw public_html/ -e "<!-- Begin WordPress Cache (DO NOT MODIFY) -->"

    Find all instance where eval base64 code occurs

    grep -rnw public_html/ -e "eval(base64_decode("
    Thread Starter abehjat

    (@abehjat)

    I found them all, I’m just doing a quick brush up on them.

    However, the beautiful thing is I’m lucky the main file wasn’t deleted, and I can track all the locations the hacks occured, including the footer of every theme.

    This hack is quite annoying!

    Thread Starter abehjat

    (@abehjat)

    First RevSlider and now these. Interesting. Thank you for the info rawcoder!

    Forum: Fixing WordPress
    In reply to: Suspected Hack

    I got hacked as well.

    Luckily, the hacker couldn’t edit their source files (that leads to the infection), and have read most of their code)

    Check all the files that are edited on December 31, 2013 (at 4:17 PM)

    All the damaged files have been editing by that time based on the following code:

    ‘touch(“wp-includes/xmlrpc.php”, mktime(12, 17, 11, 12, 31, 2013));’

    (they hacked .htaccess files, too)

    Check all the files that are edited on December 31, 2013 (at 4:17 PM)

    All the damaged files have been editing by that time based on the following code:

    touch("wp-includes/xmlrpc.php", mktime(12, 17, 11, 12, 31, 2013));

    An alternative is to center via ‘text-align:center’ style. The button seems to be inline according to CSS. Therefore, that can help in centering.

    Also, don’t forget to input “center” the position of the button.

    Therefore:

    <p style="text-align: center;">[button-white url="#" target="_blank" position="center"]<i class="icon-cloud-download"></i> Button [/button-white]</p>

    Would be nice if there are updates in this. Quite frankly it is annoying that Facebook is puling this off.

    Go to the plugin folder for Yoast SEO (called wordpress-seo)

    Open the frontend directory, and you will find the file called “class-opengraph”

    You can modify the php code where instead of a single quote ( ‘ ), you can use a double quote through escaping mechanism. Here is an example:

    /**
    	 * Display an OpenGraph image tag
    	 *
    	 * @param string $img Source URL to the image
    	 *
    	 * @return bool
    	 */
    	private function image_output( $img ) {
    		if ( empty( $img ) )
    			return false;
    
    		$img = trim( apply_filters( 'wpseo_opengraph_image', $img ) );
    		if ( !empty( $img ) ) {
    			if ( strpos( $img, 'http' ) !== 0 ) {
    				if ( $img[0] != '/' )
    					return false;
    
    				// If it's a relative URL, it's relative to the domain, not necessarily to the WordPress install, we
    				// want to preserve domain name and URL scheme (http / https) though.
    				$parsed_url = parse_url( home_url() );
    				$img        = $parsed_url['scheme'] . '://' . $parsed_url['host'] . $img;
    			}
    
    			if ( in_array( $img, $this->shown_images ) )
    				return false;
    
    			array_push( $this->shown_images, $img );
    
    			echo "<meta property=\"og:image\" content=\"" . esc_url( $img ) . "\"/>\n";
    			return true;
    		}
    
    	}
Viewing 9 replies - 1 through 9 (of 9 total)