Skip navigation

Monthly Archives: junio 2010

Intenta primero con las alternativas que da Sucuri Security Labs official blog

If your site got hacked on the last mass infection of WordPress sites out there, we have a simple solution to clean it up.

For Network Solutions users:

If your site is at Network Solutions, and you have that “virtual-ad.org” malware, the solution is simple.

Login via FTP and remove the file cgi-bin/php.ini. That’s all you need to do to protect your users.

You will still have some “.nts” files in there (which you can remove later), but they will not be executed without the php.ini.

Via SSH:

If you have SSH access to your server, run the following commands on your web root:

$ find ./ -name “*.php” -type f | \ xargs sed -i ‘s###g’ 2>&1$ find ./ -name “*.php” -type f | \ xargs sed -i ‘/./,$!d’ 2>&1

Via web:

If you don’t have SSH access, download this file to your desktop:
http://sucuri.net/malware/helpers/wordpress-fix_php.txt and rename it to wordpress-fix.php.

But the best solution is to open a new blogspot on another server.

Anuncios