This article details how to configure and install Mailjet on your WordPress instance. If you decide to use a different outbound mail relay, the procedure will be similar. Continue reading “WordPress Plugins (2.1 Interact with your users – Outbound mail handler / Mail Relay with Mailjet )”
Most of us are familiar with files, directories, and sub-directories. In the art of computer science (yes, that “art” v “science” reference was intentional), directories and sub-directories are a way to organize files into a meaningful hierarchy. WordPress installations rely on this hierarchical file organization to make sense of the thousands of files that are required to make WordPress work.
When installing WordPress, it is a reasonable idea to place the installation itself into a sub-directory, instead of in the primary web accessible directory (which is often called “./public_html/”). It is easier to manage the WordPress installation if installed in a simple sub-directory such as “/wp/”. Continue reading “WordPress: Configure WordPress to work from a Sub-directory”
Mail handling. Really. Of all the ways to make your web site “sexy”, I’ll bet a dollar that mail handling doesn’t make the top ten on your radar. But I’m here to try to change your mind about that.
This post is a part of the WordPress Plugins discussion threads and focuses on Plugins that increase the Security of your WordPress site.
First, a definition for this very important section. When it comes to any system, Security is particularly interested in three components. We’ll be examining WordPress Plugins that help to achieve:
- Confidentiality: Is the information provided to only those who have a need to know? Is the data protected from viewing by those who should not have visibility?
- Integrity: Does it relate to hackers defacing a web site? Can it look like one person is posting, when in fact someone else is posting? Can attribution of the information change? Are there controls in place to confirm the identity of the person interacting with the web site?
- Availability: Is the information protected against System outages? Is the data available within an allowable speed constraint?