<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Web Design Archives -</title>
	<atom:link href="https://cvtfradio.net/category/portfolio/web-design/feed/" rel="self" type="application/rss+xml" />
	<link>https://cvtfradio.net/category/portfolio/web-design/</link>
	<description>Conscious Vibrations from terra firma radio</description>
	<lastBuildDate>Sun, 23 Aug 2015 22:00:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Adding an Admin User to the WordPress Database via MySQL</title>
		<link>https://cvtfradio.net/2015/06/adding-an-admin-user-to-the-wordpress-database-via-mysql/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=adding-an-admin-user-to-the-wordpress-database-via-mysql</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Mon, 01 Jun 2015 18:10:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[add user to dababase]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2910</guid>

					<description><![CDATA[<p>How to Add an Admin User to the WordPress Database via MySQL &#160; &#160; &#160; &#160; &#160; &#160; Few days ago, we ran into an issue where a user’s site got hacked and their admin account was deleted from the database. This locked them out of their site without any other entry. We went in [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/06/adding-an-admin-user-to-the-wordpress-database-via-mysql/">Adding an Admin User to the WordPress Database via MySQL</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>How to Add an Admin User to the WordPress Database via MySQL</p>
<p><img fetchpriority="high" decoding="async" class="alignleft" src="https://cdn4.wpbeginner.com/blogposts/wpusersinsert.gif" alt="wp-users insert phpmyadmin table" width="520" height="201" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Few days ago, we ran into an issue where a user’s site got hacked and their admin account was deleted from the database. This locked them out of their site without any other entry. We went in to the phpMyAdmin and created a new admin user to grant them access. In this article, we will show you a step by step guide on how to create an admin user in WordPress Database via MySQL.</p>
<p>Note: You should always make a backup of your database before performing any MySQL edits. This tutorial requires basic understanding of how phpMyAdmin works.</p>
<p>First, you need to login to phpMyAdmin and locate your WordPress database.</p>
<p>Once inside phpMyAdmin;</p>
<p>Once you are in, we will be making changes to the wp_users and wp_usermeta tables. Lets go ahead and click on wp_users table.</p>
<p>phpMyAdmin wp_users table</p>
<p>We need to insert our new admin user’s information, so click on the Insert tab like it shows in the image above. In the insert form, add the following:</p>
<p>ID – pick a number (in our example, we will use the number 4).<br />
user_login – insert the username you want to use to access the WordPress Dashboard.<br />
user_pass – add a password for this username. Make sure to select MD5 in the functions menu (Refer to the screenshot below).<br />
user_nicename – put a nickname or something else that you would like to refer yourself as.<br />
user_email – add the email you want to associate with this account.<br />
user_url – this would be the url to your website.<br />
user_registered – select the date/time for when this user is registered.<br />
user_status – set this to 0.<br />
display_name – put the name you like to display for this user on the site (it can be your user_nicename value as well).<br />
Click on the Go Button</p>
<p>The post <a href="https://cvtfradio.net/2015/06/adding-an-admin-user-to-the-wordpress-database-via-mysql/">Adding an Admin User to the WordPress Database via MySQL</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress 4.2.2 Security and Maintenance Release</title>
		<link>https://cvtfradio.net/2015/05/wordpress-4-2-2-security-and-maintenance-release/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-4-2-2-security-and-maintenance-release</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Tue, 12 May 2015 22:04:03 +0000</pubDate>
				<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[WordPress 4.2.2 Security and Maintenance Release]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2885</guid>

					<description><![CDATA[<p>WordPress 4.2.2 Security and Maintenance Release Posted May 7, 2015 by Samuel Sidler. Filed under Releases, Security. WordPress 4.2.2 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately. Version 4.2.2 addresses two security issues: &#160; The Genericons icon font package, which [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/05/wordpress-4-2-2-security-and-maintenance-release/">WordPress 4.2.2 Security and Maintenance Release</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="fancy"><a href="https://wordpress.org/news/2015/05/wordpress-4-2-2/">WordPress 4.2.2 Security and Maintenance Release</a></h2>
<p><a href="https://cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo.jpg"><img decoding="async" class=" size-medium wp-image-2886 alignleft" src="https://cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo-300x159.jpg" alt="WordPress-logo" width="300" height="159" srcset="https://cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo-300x159.jpg 300w, https://cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo.jpg 780w" sizes="(max-width: 300px) 100vw, 300px" /></a>Posted May 7, 2015 by <a href="https://samuelsidler.com/">Samuel Sidler</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>, <a href="https://wordpress.org/news/category/security/" rel="category tag">Security</a>.</p>
<div class="storycontent">
<p>WordPress 4.2.2 is now available. This is a <strong>critical security release</strong> for all previous versions and we strongly encourage you to update your sites immediately.</p>
<p>Version 4.2.2 addresses two security issues:</p>
<p>&nbsp;</p>
<ul>
<li>The Genericons icon font package, which is used in a number of popular themes and plugins, contained an HTML file vulnerable to a cross-site scripting attack. All affected themes and plugins hosted on <a href="https://wordpress.org/">WordPress.org</a> (including the Twenty Fifteen default theme) have been updated today by the WordPress security team to address this issue by removing this nonessential file. To help protect other Genericons usage, WordPress 4.2.2 proactively scans the wp-content directory for this HTML file and removes it. Reported by Robert Abela of <a href="https://netsparker.com">Netsparker</a>.</li>
<li>WordPress versions 4.2 and earlier are affected by a <a href="https://wordpress.org/news/2015/04/wordpress-4-2-1/">critical cross-site scripting vulnerability</a>, which could enable anonymous users to compromise a site. WordPress 4.2.2 includes a comprehensive fix for this issue. Reported separately by Rice Adu and Tong Shi from Baidu[X-team].</li>
</ul>
<p>The release also includes hardening for a potential cross-site scripting vulnerability when using the visual editor. This issue was reported by Mahadev Subedi.</p>
<p>Our thanks to those who have practiced <a href="https://make.wordpress.org/core/handbook/reporting-security-vulnerabilities/">responsible disclosure</a> of security issues.</p>
<p>WordPress 4.2.2 also contains fixes for 13 bugs from 4.2. For more information, see the <a href="https://codex.wordpress.org/Version_4.2.2">release notes</a> or consult the <a href="https://core.trac.wordpress.org/log/branches/4.2?rev=32418&amp;stop_rev=32324">list of changes</a>.</p>
<p><a href="https://wordpress.org/download/">Download WordPress 4.2.2</a> or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.2.2.</p>
<p>Thanks to everyone who contributed to 4.2.2:</p>
</div>
<p>The post <a href="https://cvtfradio.net/2015/05/wordpress-4-2-2-security-and-maintenance-release/">WordPress 4.2.2 Security and Maintenance Release</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress 4.2.1 released new patch</title>
		<link>https://cvtfradio.net/2015/04/wordpress-4-2-1-released-new-patch/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-4-2-1-released-new-patch</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Mon, 27 Apr 2015 21:48:29 +0000</pubDate>
				<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2364</guid>

					<description><![CDATA[<p>WordPress 4.2.1 Released to Patch Comment Exploit Vulnerability Sarah Gooding April 27, 2015 4 photo credit: Will Montague – cc This morning we reported on an XSS vulnerability in WordPress 4.2, 4.1.2, 4.1.1, and 3.9.3, which allows an attacker to compromise a site via its comments. The security team quickly patched the vulnerability and released [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/04/wordpress-4-2-1-released-new-patch/">WordPress 4.2.1 released new patch</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<article id="post-42873" class="entry post publish author-sarah post-42873 format-standard has-post-thumbnail category-news category-wordpressorg post_tag-security">
<header class="entry-header">
<h1 class="entry-title font-headlines">WordPress 4.2.1 Released to Patch Comment Exploit Vulnerability</h1>
<div class="entry-byline font-secondary"><span class="entry-author"><a class="url fn n" title="Posts by Sarah Gooding" href="https://wptavern.com/author/sarah" rel="author">Sarah Gooding</a></span> <time class="entry-published updated" title="Monday, April 27, 2015, 3:46 pm" datetime="2015-04-27T15:46:07-04:00">April 27, 2015</time> <a class="comments-link" href="https://wptavern.com/wordpress-4-2-1-released-to-patch-comment-exploit-vulnerability#comments">4</a></div>
</header>
<div class="entry-content">
<figure id="attachment_20655" class="wp-caption aligncenter"><a class="img-hyperlink" href="https://i2.wp.com/wptavern.com/wp-content/uploads/2014/04/security-release.jpg" rel="prettyPhoto[42873]"><img decoding="async" class="size-full wp-image-20655" src="https://i2.wp.com/wptavern.com/wp-content/uploads/2014/04/security-release.jpg?resize=1024%2C505" alt="photo credit: Will Montague - cc" width="644" height="318" /></a><figcaption class="wp-caption-text font-secondary">photo credit: <a href="https://www.flickr.com/photos/willmontague/3813295674/">Will Montague</a> – <a href="https://creativecommons.org/licenses/by-nc/2.0/">cc</a></figcaption></figure>
<p>This morning we reported on an <a href="https://wptavern.com/zero-day-xss-vulnerability-in-wordpress-4-2-currently-being-patched" target="_blank">XSS vulnerability in WordPress 4.2</a>, 4.1.2, 4.1.1, and 3.9.3, which allows an attacker to compromise a site via its comments. The security team quickly patched the vulnerability and <a href="https://wordpress.org/news/2015/04/wordpress-4-2-1/" target="_blank">released 4.2.1</a> within hours of being notified.</p>
<p>WordPress’ official statement on the security issue:</p>
<blockquote><p>The WordPress team was made aware of a XSS issue a few hours ago that we will release an update for shortly. It is a core issue, but the number of sites vulnerable is much smaller than you may think because the vast majority of WordPress-powered sites run Akismet, which blocks this attack. When the fix is tested and ready in the coming hours WordPress users will receive an auto-update and should be safe and protected even if they don’t use Akismet.</p></blockquote>
<p>That auto-update is now being rolled out to sites where updates have not been disabled. If you are unsure of whether or not your site can perform automatic background updates, Gary Pendergast linked to the <a href="https://wordpress.org/plugins/background-update-tester/" target="_blank">Background Update Tester</a> plugin in the security release. This is a core-supported plugin that will check your site for background update compatibility and explain any issues.</p>
<p>Since <a href="https://wordpress.org/plugins/akismet/" target="_blank">Akismet</a> is active on more than a million websites, the number of affected users that were not protected is much smaller than it might have been otherwise.</p>
<p>WordPress 4.2.1 is a critical security release for a widely publicized vulnerability that you do not want to ignore. Users are advised to update immediately. The background update may already have hit your site. If not, you can update manually by navigating to Dashboard → Updates.</p>
</div>
</article>
<p>The post <a href="https://cvtfradio.net/2015/04/wordpress-4-2-1-released-new-patch/">WordPress 4.2.1 released new patch</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress Security Alert</title>
		<link>https://cvtfradio.net/2015/04/wordpress-security-alert/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-security-alert</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Mon, 13 Apr 2015 20:26:39 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Wordpress Security Alert]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2271</guid>

					<description><![CDATA[<p>WordPress Security Alert &#8211; WP Super cache Credit: Wikipedia Upgrade immediately ITWorld&#124;April 8, 2015 Security firm Sucuri revealed on their blog this week that they had uncovered a persistent cross-site scripting vulnerability in the popular WordPress plugin WP Super Cache. The effects of this vulnerability can be severe as an attacker can potentially insert malicious code [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/04/wordpress-security-alert/">WordPress Security Alert</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<header>
<h1>WordPress Security Alert &#8211; WP Super cache</h1>
</header>
<figure class="hero-img"><img decoding="async" src="https://images.techhive.com/images/article/2015/04/three_surveillance_cameras-100577821-primary.idge.jpg" alt="three surveillance cameras" /><figcaption> Credit: <a href="https://www.google.com/url?sa=i&amp;rct=j&amp;q=&amp;esrc=s&amp;source=images&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=0CAMQjxw&amp;url=ht" target="_blank" rel="nofollow">Wikipedia</a> </figcaption></figure>
<section class="deck">
<h2>Upgrade immediately</h2>
</section>
<div class="byline">
<p class="dateline">ITWorld<span class="divider">|</span>April 8, 2015</p>
</div>
<section class="bodee">
<div id="drr-container">
<p>Security firm <a href="https://sucuri.net/" target="new">Sucuri</a> revealed on their <a href="https://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html" target="new">blog this week</a> that they had uncovered a persistent <a href="https://en.wikipedia.org/wiki/Cross-site_scripting" target="new">cross-site scripting</a> vulnerability in the popular WordPress plugin<a href="https://wordpress.org/plugins/wp-super-cache/" target="new"> WP Super Cache</a>. The effects of this vulnerability can be severe as an attacker can potentially insert malicious code into WordPress pages without your knowledge. Anyone who has experienced this type of attack due to a plugin security flaw knows how difficult and time consuming remediation can be.</p>
<figure class="large "><img loading="lazy" decoding="async" src="https://images.techhive.com/images/article/2015/04/supercache1-100577816-large.idge.png" alt="supercache1" width="620" height="123" /> <small class="credit">Cypress North</small></figure>
<p>WP Super Cache is deployed across all of the WordPress sites we host in our data center, and for good reason. The excellent plugin dramatically boosts the performance of WordPress sites while simultaneously reducing load on the web servers. The code for this plugin is mature and stable, rarely requiring updates. That&#8217;s part of the reason why it&#8217;s trusted by over 7 million websites. It&#8217;s popularity makes this security flaw a big concern for site owners.</p>
<figure class="medium "><img loading="lazy" decoding="async" src="https://images.techhive.com/images/article/2015/04/supercache2-100577820-medium.idge.png" alt="supercache2" width="375" height="480" /> <small class="credit">Cypress North</small></figure>
<p>The update process is quick and easy so you should take the time to log in and click the update now link as soon as you&#8217;re able. If you&#8217;re fortunate enough to maintain your sites under a multi-site install you&#8217;ll be able to take care of this issue in one shot. Otherwise, like us, you&#8217;re stuck logging into each installation and manually updating each site like we spent all yesterday doing.</p>
<p>According to the blog post by <a href="https://blog.sucuri.net/author/marc" rel="author">Marc-Alexandre Montpas</a>:</p>
<blockquote><p>Using this vulnerability, an attacker using a carefully crafted query could insert malicious scripts to the plugin’s cached file listing page. As this page requires a valid nonce in order to be displayed, a successful exploitation would require the site’s administrator to have a look at that particular section, manually.</p></blockquote>
<p>The nonce requirement lowers the odds of the backdoor taking effect since the cached page gets purged periodically, but still, better safe than sorry. The scale of the vulnerable sites makes exploitation an inevitable event. Do your part to protect the web and get updating.</p>
</div>
</section>
<p>The post <a href="https://cvtfradio.net/2015/04/wordpress-security-alert/">WordPress Security Alert</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Web Security Issues</title>
		<link>https://cvtfradio.net/2014/10/web-security-issues/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=web-security-issues</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Fri, 03 Oct 2014 09:49:57 +0000</pubDate>
				<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[Web Security Issues]]></category>
		<guid isPermaLink="false">http://spotlight.themerex.net/?p=1801</guid>

					<description><![CDATA[<p><img width="540" height="260" src="https://cvtfradio.net/wp-content/uploads/2014/10/ecryption.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://cvtfradio.net/wp-content/uploads/2014/10/ecryption.jpg 540w, https://cvtfradio.net/wp-content/uploads/2014/10/ecryption-300x144.jpg 300w" sizes="(max-width: 540px) 100vw, 540px" /></p>
<p>A serious vulnerability in the WP eCommerce Plugin was announced within the last 24 hours (321st Oct 2014) . A fix has been released and some hosting companies are already auto-upgrading customers to the newest version. Upgrade to 3.8.14.4 of WP eCommerce immediately if you use this plugin. Please spread the word because with almost [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2014/10/web-security-issues/">Web Security Issues</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img width="540" height="260" src="https://cvtfradio.net/wp-content/uploads/2014/10/ecryption.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://cvtfradio.net/wp-content/uploads/2014/10/ecryption.jpg 540w, https://cvtfradio.net/wp-content/uploads/2014/10/ecryption-300x144.jpg 300w" sizes="(max-width: 540px) 100vw, 540px" /></p><p id="yui_3_16_0_1_1416864681517_48384">A serious vulnerability in the <a class="yiv4485711366valid-link yiv4485711366validation-enabled yiv4485711366validating" href="https://clicks.aweber.com/y/ct/?l=FLnrU&amp;m=3kDg7Km37O6aApy&amp;b=0ptQiJ6leDcIw2mMKUw6kg" target="_blank" rel="nofollow">WP eCommerce Plugin</a> was announced within the last 24 hours (321st Oct 2014) . A fix has been released and some hosting companies are already auto-upgrading customers to the newest version.</p>
<p id="yui_3_16_0_1_1416864681517_48387">Upgrade to 3.8.14.4 of WP eCommerce immediately if you use this plugin. Please spread the word because with almost 3 million downloads this is a very popular plugin.</p>
<p id="yui_3_16_0_1_1416864681517_48390"><strong id="yui_3_16_0_1_1416864681517_48389"><a id="yui_3_16_0_1_1416864681517_48388" class="yiv4485711366valid-link yiv4485711366validation-enabled yiv4485711366validating" href="https://clicks.aweber.com/y/ct/?l=FLnrU&amp;m=3kDg7Km37O6aApy&amp;b=lF4QGQud_ZQEoo5ZAytSMA" target="_blank" rel="nofollow">Details on our blog&#8230;</a></strong></p>
<p id="yui_3_16_0_1_1416864681517_48391"><strong>​</strong></p>
<p>The post <a href="https://cvtfradio.net/2014/10/web-security-issues/">Web Security Issues</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
