gioni
Forum Replies Created
-
Forum: Plugins
In reply to: [WP Cerber Security, Anti-spam & Malware Scan] bug form loginHi! What version of WP Cerber do you use? Where did you get it?
You need to check the Activity log for requests originating from your computer. Most likely there is a plugin or some code that sends authentication requests (tries to log you in) in background or when you reload the login page. Click the “My IP” button on the Activity tab.
Forum: Plugins
In reply to: [WP Cerber Security, Anti-spam & Malware Scan] WP Cerber cerber-load.php?Hi! You can fix it in the WP Cerber settings. Here is what I recommend to set: https://wpcerber.com/custom-404-page-error/
Forum: Plugins
In reply to: [WP Cerber Security, Anti-spam & Malware Scan] Block user with a scriptThat is the correct way. At the same time, the recommended, in terms of compatibility with features releases of WP Cerber, way is:
include_once( 'set here your plugins directory path' . '/wp-cerber/cerber-load.php' ); if ( function_exists( 'cerber_load_admin_code' ) ) { cerber_load_admin_code(); cerber_block_user( $user_id, $msg, $note ); } /* Parameters are: $user_id = User ID $msg = An optional message to be displayed on the login page when the user tries to log in $note = An optional note visible to website admins */
The issue with the admin language has been fixed in 9.1.
Many things have happened since the version 9.0 was released. The actual version is https://wpcerber.com/wp-cerber-security-9-5-3/
Install it as described in our blog.
What version of WP Cerber do you use? I suspect it’s outdated.
Have you updated WP Cerber? If so, have the messages disappeared?
Forum: Plugins
In reply to: [WP Cerber Security, Anti-spam & Malware Scan] WP Cerber Security v9.5 errorThanks for telling me. We’ll look into it soon.
You do not need to add all suspicious IP addresses to Cloudflare manually. Blocking them indiscriminately is not a good idea, as it is just overkill. WP Cerber uses sophisticated algorithms, several metrics and the history of suspicious and malicious requests originating from an IP address to determine whether it should be blocked. This evaluation is done on-the-fly, and it is much faster than your manual intervention. Moreover, unlike a human, WP Cerber works around the clock, 24/7/365. I’m sorry, there are no plans to implement checkboxes.
You do not need to do that manually. Our Cloudflare add-on will block malicious IP for you automatically: https://wpcerber.com/cloudflare-add-on-wp-cerber/
Hi! I have no idea what you are talking about. Please elaborate.
Hi! Check the web server error log. Critical errors are logged there. There is no other source of information regarding the issue. I think the problem is caused by another plugin that interferes with WP Cerber. You can also try disabling other user-related plugins to find if my guess is true.
WP Cerber uses its cookies for a security feature that requires keep updated .htaccess when the website admin changes the cookies prefix. For the time being, the only workaround is commenting out the lines 272,273,274 in /admin/cerber-admin-settings.php (WP Cerber 9.5.3). The next version of WP Cerber will get an improvement making it compatible with read-only .htaccess files.
There is no specific setting, it should work “out of the box”. However, please make sure that you have set “Load security engine” to “Standard mode”. It’s on the Main Settings tab.
Forum: Plugins
In reply to: [WP Cerber Security, Anti-spam & Malware Scan] tabla cerber_files muy pesadaHola! This database table is used by the integrity scanner to store information about files on your WordPress website, and it is truncated with each scan. You do not need to empty it manually.
When WP Cerber scans your website’s files, it calculates and temporarily stores the checksums (hashes) and other characteristic of each file in the “cerber_files” table. This allows the scanner to compare the stored checksums against the current state of your website’s files during subsequent scans. If any discrepancies are detected, the WP Cerber can identify modified, added, or deleted files, potentially indicating unauthorized changes, security breaches, or malware infections.