ຄຳອະທິບາຍ
Stop XML-RPC Attacks protects your WordPress site from XML-RPC brute force attacks, DDoS attempts, and reconnaissance probes while maintaining compatibility with essential services like Jetpack and WooCommerce.
Features:
- Three security modes: Full Disable, Guest Disable, or Selective Blocking
- Blocks dangerous methods: system.multicall, pingback.ping, and more
- Compatible with Jetpack and WooCommerce
- Optional user enumeration blocking
- Attack logging for monitoring
- Zero configuration required – works out of the box
- Clean, intuitive admin interface
ການຕິດຕັ້ງ
- Upload the plugin files to
/wp-content/plugins/stop-xmlrpc-attacks/ - Activate the plugin through the ‘Plugins’ menu in WordPress
- Go to Settings > XML-RPC Security to configure (optional)
ຄຳຖາມທີ່ພົບເລື້ອຍ
-
Will this break Jetpack?
-
No! The default “Selective Blocking” mode is fully compatible with Jetpack and WooCommerce.
-
What’s the difference between the security modes?
-
- Full Disable: Maximum security, disables XML-RPC completely
- Guest Disable: Balanced approach, only allows XML-RPC for logged-in users
- Selective Blocking: Best compatibility, only blocks dangerous methods
-
How do I enable logging?
-
Go to Settings > XML-RPC Security and check “Enable Attack Logging”. Logs will be written to your debug.log file when WP_DEBUG is enabled.
ການຣີວິວ
ຜູ້ຮ່ວມພັດທະນາ ແລະ ຜູ້ພັດທະນາ
“Stop XML-RPC Attacks” ແມ່ນຊອຟແວໂອເພັນຊອດ (Open Source). ບຸກຄົນຕໍ່ໄປນີ້ໄດ້ມີສ່ວນຮ່ວມໃນການພັດທະນາປລັກອິນນີ້.
ຜູ້ຮ່ວມພັດທະນາ“Stop XML-RPC Attacks” ໄດ້ຖືກແປເປັນ 2 ພາສາທ້ອງຖິ່ນ. ຂໍຂອບໃຈ ທີມງານຜູ້ແປ ສຳລັບການປະກອບສ່ວນຂອງເຂົາເຈົ້າ.
ແປ “Stop XML-RPC Attacks” ເປັນພາສາຂອງເຈົ້າ.
ສົນໃຈຮ່ວມພັດທະນາບໍ່?
ເບິ່ງລະຫັດ, ກວດເບິ່ງ ຄັງເກັບ SVN, ຫຼື ຕິດຕາມ ບັນທຶກການພັດທະນາ ຜ່ານ RSS.
ບັນທຶກການປ່ຽນແປງ
2.0.0
- Added admin interface with visual settings
- Three security modes to choose from
- Optional attack logging
- Improved code quality and security
- Full internationalization support
1.0.1
- Initial release
- Basic blocking of dangerous methods
