<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Staff, Author at OmniSOS - Elite WordPress Security</title>
	<atom:link href="https://omnisos.com/author/staff/feed/" rel="self" type="application/rss+xml" />
	<link>https://omnisos.com/author/staff/</link>
	<description>Shielding Attacks, Thwarting Intruders, Saving Your Site!</description>
	<lastBuildDate>Wed, 29 Oct 2014 17:21:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>What exactly is Malware?</title>
		<link>https://omnisos.com/kb/malware/</link>
					<comments>https://omnisos.com/kb/malware/#respond</comments>
		
		<dc:creator><![CDATA[Staff]]></dc:creator>
		<pubDate>Tue, 28 Oct 2014 22:22:18 +0000</pubDate>
				<category><![CDATA[Knowledge Base]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[code injection]]></category>
		<category><![CDATA[command injection]]></category>
		<category><![CDATA[crack]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[injection]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[php]]></category>
		<category><![CDATA[remote file inclusion]]></category>
		<category><![CDATA[RFI]]></category>
		<category><![CDATA[script]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[sql injection]]></category>
		<category><![CDATA[user input validation]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[whitelist]]></category>
		<guid isPermaLink="false">http://omnisos.com/?p=555</guid>

					<description><![CDATA[<p>Malware (Virus) is a very broad term, and there are many different ways that malware can be injected into a website. One common way that malware is inserted is by...</p>
<p>The post <a rel="nofollow" href="https://omnisos.com/kb/malware/">What exactly is Malware?</a> appeared first on <a rel="nofollow" href="https://omnisos.com">OmniSOS - Elite WordPress Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Malware (Virus)</strong> is a very broad term, and there are many different ways that malware can be injected into a website. One common way that malware is inserted is by a File Inclusion vulnerability. With this vulnerability, the hacker will insert a malicious script into the site by editing the PHP. This is normally performed by using methods similar to Code Injections. As a result, creating secure user input validation will also mitigate this vulnerability, along with coding the PHP to eliminate the possibility of Remote File Inclusion (RFI). Malware can also be inserted by gaining login access, so many other security measures must be taken to mitigate this risk. Oftentimes, the hacker&#8217;s goal is to insert malware, no matter what vulnerability he/she is using to gain access.</p>
<p>The post <a rel="nofollow" href="https://omnisos.com/kb/malware/">What exactly is Malware?</a> appeared first on <a rel="nofollow" href="https://omnisos.com">OmniSOS - Elite WordPress Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://omnisos.com/kb/malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What are Code Injections?</title>
		<link>https://omnisos.com/kb/code-injections/</link>
					<comments>https://omnisos.com/kb/code-injections/#respond</comments>
		
		<dc:creator><![CDATA[Staff]]></dc:creator>
		<pubDate>Tue, 28 Oct 2014 22:16:48 +0000</pubDate>
				<category><![CDATA[Knowledge Base]]></category>
		<category><![CDATA[characters]]></category>
		<category><![CDATA[code injection]]></category>
		<category><![CDATA[command injection]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[injection]]></category>
		<category><![CDATA[LFI]]></category>
		<category><![CDATA[local file inclusion]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[remote file inclusion]]></category>
		<category><![CDATA[RFI]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[server]]></category>
		<category><![CDATA[sql]]></category>
		<category><![CDATA[sql injection]]></category>
		<category><![CDATA[user input]]></category>
		<category><![CDATA[validation]]></category>
		<category><![CDATA[whitelist]]></category>
		<guid isPermaLink="false">http://omnisos.com/?p=552</guid>

					<description><![CDATA[<p>Code Injections (such as SQL Injections and command injections) are attacks that inject code into a server or database to unexpectedly execute commands or to insert malware. The most common...</p>
<p>The post <a rel="nofollow" href="https://omnisos.com/kb/code-injections/">What are Code Injections?</a> appeared first on <a rel="nofollow" href="https://omnisos.com">OmniSOS - Elite WordPress Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Code Injections (such as SQL Injections and command injections)</strong> are attacks that inject code into a server or database to unexpectedly execute commands or to insert malware. The most common form of Code Injection a hacker will use is to use special command line characters in a normal user input box to trick the server into executing the following command. This vulnerability is used for a wide range of malicious activity, which makes it particularly dangerous. These commands can be injected through any average text input box. The most effective way to prevent Code Injection is to create secure user input validation (such as a whitelist that allows only &#8220;innocent&#8221; characters, like letters and numbers), and to implement a secure firewall.</p>
<p>The post <a rel="nofollow" href="https://omnisos.com/kb/code-injections/">What are Code Injections?</a> appeared first on <a rel="nofollow" href="https://omnisos.com">OmniSOS - Elite WordPress Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://omnisos.com/kb/code-injections/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is a Brute-Force Attack?</title>
		<link>https://omnisos.com/kb/brute-force/</link>
					<comments>https://omnisos.com/kb/brute-force/#respond</comments>
		
		<dc:creator><![CDATA[Staff]]></dc:creator>
		<pubDate>Tue, 28 Oct 2014 22:08:48 +0000</pubDate>
				<category><![CDATA[Knowledge Base]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[brute-force]]></category>
		<category><![CDATA[crack]]></category>
		<category><![CDATA[key]]></category>
		<category><![CDATA[login]]></category>
		<category><![CDATA[passcode]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">http://omnisos.com/?p=549</guid>

					<description><![CDATA[<p>Brute-Force attacks (also called an Exhaustive Key Search) are used with the intention of gaining access to the server or website by guessing the login authentication. Hackers who use this...</p>
<p>The post <a rel="nofollow" href="https://omnisos.com/kb/brute-force/">What is a Brute-Force Attack?</a> appeared first on <a rel="nofollow" href="https://omnisos.com">OmniSOS - Elite WordPress Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Brute-Force attacks (also called an Exhaustive Key Search)</strong> are used with the intention of gaining access to the server or website by guessing the login authentication. Hackers who use this method typically have several computers with very fast hardware which use an algorithm to guess the password. These machines can guess thousands to millions of passwords per minute, and they will typically guess every possible password. This can be a very dangerous attack if security measures are not set up properly. The best way to prevent a successful Brute-Force attack is to prevent access to the login page after a certain amount of failed login attempts (implemented into most firewalls), to have a strong, secure password, and to set up two factor authentication. Two factor authentication uses a password, and also sends a verification code to the user&#8217;s cell phone. This makes it virtually impossible for Brute-Force attacks to be successful.</p>
<p>The post <a rel="nofollow" href="https://omnisos.com/kb/brute-force/">What is a Brute-Force Attack?</a> appeared first on <a rel="nofollow" href="https://omnisos.com">OmniSOS - Elite WordPress Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://omnisos.com/kb/brute-force/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DDoS &#8211; What does it stand for?</title>
		<link>https://omnisos.com/kb/ddos/</link>
					<comments>https://omnisos.com/kb/ddos/#respond</comments>
		
		<dc:creator><![CDATA[Staff]]></dc:creator>
		<pubDate>Tue, 28 Oct 2014 21:56:09 +0000</pubDate>
				<category><![CDATA[Knowledge Base]]></category>
		<category><![CDATA[crash]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[denial of service]]></category>
		<category><![CDATA[distributed denial of service]]></category>
		<category><![CDATA[dos]]></category>
		<category><![CDATA[overload]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[server]]></category>
		<guid isPermaLink="false">http://omnisos.com/?p=545</guid>

					<description><![CDATA[<p>Distributed Denial of Service (DDoS) attacks stress the server in several ways, with the intention of slowing it down or crashing the server itself. Hackers who use DDoS attacks are...</p>
<p>The post <a rel="nofollow" href="https://omnisos.com/kb/ddos/">DDoS &#8211; What does it stand for?</a> appeared first on <a rel="nofollow" href="https://omnisos.com">OmniSOS - Elite WordPress Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Distributed Denial of Service (DDoS)</strong> attacks stress the server in several ways, with the intention of slowing it down or crashing the server itself. Hackers who use DDoS attacks are not necessarily trying to gain access to the website. Their main goal is to make the website inaccessible to its users. It is often unknown why hackers would use an attack like this. In the past, many DDoS attacks have been targeted at large companies. However, it is now much more common for these attacks to be directed at smaller websites, posing a threat to many normal websites on the internet. Having a secure and advanced firewall is one of the best methods for preventing DDoS attacks.</p>
<p>The post <a rel="nofollow" href="https://omnisos.com/kb/ddos/">DDoS &#8211; What does it stand for?</a> appeared first on <a rel="nofollow" href="https://omnisos.com">OmniSOS - Elite WordPress Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://omnisos.com/kb/ddos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
