A powerful earthquate hits the pacific specifically at Papua New Guinea around 8:58 PM (Philippine Standard Time) tonight (May 14, 2019). A tsunami alert has been announced by Pacific Tsunami Warning Center following the 7.7 earthquake in the south-west of the pacific.
Based on Preliminary earthquake parameters, hazardous tsunami waves are possible for coasts located within 1000 km of the earthquake epicenter according to the PTWC.
In this guide, you will learn how to use Remote MySQL feature that allows remote hosts (different servers) to access your MySQL databases on your account. This is useful, for example, if you wish to allow shopping cart or guestbook applications on other servers to access your databases.
What you’ll need
Before you begin this guide you’ll need the following:
Access to your cPanel account.
IP address or a fully qualified domain name that you want to have access to your MySQL databases.
Step 1 — Accessing your cPanel and locating the Remote MySQL feature
Access your cPanel using your login credentials. Afterwards, you will need to find the Remote MySQL feature, which is located under Databases section.
Step 2 — Allowing a remote server to access your databases
Enter the host’s name (another website or server) or IP address in the Host text box. If you are trying to access your database from your local computer that is running an application you should use your public IP address that can be found here: http://whatismyipaddress.com/ . Or you can specify a domain name http://www.twitter.com for example.
Click Add Host button.
IMPORTANT! You may enter a fully qualified domain name (FQDN) or an IP address. You may use the percentage sign character (%) as a wildcard. For example, to allow access from all IP addresses that begin with 192.68.0, enter 192.68.0.%.
Step 3 — Removing the remote server access to your databases
To deny access to your databases from a remote host that You have added, perform the following steps:
Click the Delete icon next to the host’s name or IP address.
Click Remove Access Host.
After following this tutorial you now know how to allow a remote machine(host) or a website to gain access to your MySQL databases and remove the access if needed.
WordPress has been always targeted by hackers because of its known vulnerabilities. These vulnerabilities does not limit only to WordPress core files but, most of the times, are the outdated plugins and themes. Securing your WordPress website takes time and should be done in a recurring process. Here are the steps you should take to protect your WordPress. Check this neon staxx game
1. Harden the security of your WordPress.
This article from WordPress codex go through some common forms of vulnerabilities, and the things you can do to help keep your WordPress installation secure. Before proceeding to the steps below, I highly recommend that you follow all the listed steps in the article and execute them.
2. Install Wordfence
This plugin, available for FREE in WordPress plugin store, is a highly recommended security plugin for your WordPress site to help you secure your website. It offers multiple features such as scanning integrity of your WordPress core files, and as well as for malware vulnerable themes, plugins, etc. NOTE AND READ: Since this is a wordpress plugin, make sure you always update it.
3. Rename your wp-login.php
Another great plugin called Rename wp-login.php works to easily rename your wp-login.php which is highly targeted by spammers and hackers trying to get in to your WordPress. This plugin will rename your wp-login.php so you only you will know where to access admin dashboard. However, if you are using the WP comment system, the point of hiding the login page will make no sense because your commenters will have to login in order to comment. Thankfully, Shrewdies wrote a detailed guide to help us fix that.
4. Scan your website
After all the hard-work, you want to make sure your website is really secured. Sucuri SiteCheck provides remote scanning and will report to you if your website is free from malware, and other security flaws.
5. Stay up to date
Know the latest plugin vulnerability.Subscribe to Sucuri’s blog. Being the security firm that we trust, Sucuri’s blog are the most up-to-date when it comes to reporting vulnerabilities simply because… it is their business.