<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>whitelist Archives - OmniSOS - Elite WordPress Security</title>
	<atom:link href="https://omnisos.com/tag/whitelist/feed/" rel="self" type="application/rss+xml" />
	<link>https://omnisos.com/tag/whitelist/</link>
	<description>Shielding Attacks, Thwarting Intruders, Saving Your Site!</description>
	<lastBuildDate>Wed, 29 Oct 2014 17:21:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>What exactly is Malware?</title>
		<link>https://omnisos.com/kb/malware/</link>
					<comments>https://omnisos.com/kb/malware/#respond</comments>
		
		<dc:creator><![CDATA[Staff]]></dc:creator>
		<pubDate>Tue, 28 Oct 2014 22:22:18 +0000</pubDate>
				<category><![CDATA[Knowledge Base]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[code injection]]></category>
		<category><![CDATA[command injection]]></category>
		<category><![CDATA[crack]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[injection]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[php]]></category>
		<category><![CDATA[remote file inclusion]]></category>
		<category><![CDATA[RFI]]></category>
		<category><![CDATA[script]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[sql injection]]></category>
		<category><![CDATA[user input validation]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[whitelist]]></category>
		<guid isPermaLink="false">http://omnisos.com/?p=555</guid>

					<description><![CDATA[<p>Malware (Virus) is a very broad term, and there are many different ways that malware can be injected into a website. One common way that malware is inserted is by...</p>
<p>The post <a rel="nofollow" href="https://omnisos.com/kb/malware/">What exactly is Malware?</a> appeared first on <a rel="nofollow" href="https://omnisos.com">OmniSOS - Elite WordPress Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Malware (Virus)</strong> is a very broad term, and there are many different ways that malware can be injected into a website. One common way that malware is inserted is by a File Inclusion vulnerability. With this vulnerability, the hacker will insert a malicious script into the site by editing the PHP. This is normally performed by using methods similar to Code Injections. As a result, creating secure user input validation will also mitigate this vulnerability, along with coding the PHP to eliminate the possibility of Remote File Inclusion (RFI). Malware can also be inserted by gaining login access, so many other security measures must be taken to mitigate this risk. Oftentimes, the hacker&#8217;s goal is to insert malware, no matter what vulnerability he/she is using to gain access.</p>
<p>The post <a rel="nofollow" href="https://omnisos.com/kb/malware/">What exactly is Malware?</a> appeared first on <a rel="nofollow" href="https://omnisos.com">OmniSOS - Elite WordPress Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://omnisos.com/kb/malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What are Code Injections?</title>
		<link>https://omnisos.com/kb/code-injections/</link>
					<comments>https://omnisos.com/kb/code-injections/#respond</comments>
		
		<dc:creator><![CDATA[Staff]]></dc:creator>
		<pubDate>Tue, 28 Oct 2014 22:16:48 +0000</pubDate>
				<category><![CDATA[Knowledge Base]]></category>
		<category><![CDATA[characters]]></category>
		<category><![CDATA[code injection]]></category>
		<category><![CDATA[command injection]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[injection]]></category>
		<category><![CDATA[LFI]]></category>
		<category><![CDATA[local file inclusion]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[remote file inclusion]]></category>
		<category><![CDATA[RFI]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[server]]></category>
		<category><![CDATA[sql]]></category>
		<category><![CDATA[sql injection]]></category>
		<category><![CDATA[user input]]></category>
		<category><![CDATA[validation]]></category>
		<category><![CDATA[whitelist]]></category>
		<guid isPermaLink="false">http://omnisos.com/?p=552</guid>

					<description><![CDATA[<p>Code Injections (such as SQL Injections and command injections) are attacks that inject code into a server or database to unexpectedly execute commands or to insert malware. The most common...</p>
<p>The post <a rel="nofollow" href="https://omnisos.com/kb/code-injections/">What are Code Injections?</a> appeared first on <a rel="nofollow" href="https://omnisos.com">OmniSOS - Elite WordPress Security</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Code Injections (such as SQL Injections and command injections)</strong> are attacks that inject code into a server or database to unexpectedly execute commands or to insert malware. The most common form of Code Injection a hacker will use is to use special command line characters in a normal user input box to trick the server into executing the following command. This vulnerability is used for a wide range of malicious activity, which makes it particularly dangerous. These commands can be injected through any average text input box. The most effective way to prevent Code Injection is to create secure user input validation (such as a whitelist that allows only &#8220;innocent&#8221; characters, like letters and numbers), and to implement a secure firewall.</p>
<p>The post <a rel="nofollow" href="https://omnisos.com/kb/code-injections/">What are Code Injections?</a> appeared first on <a rel="nofollow" href="https://omnisos.com">OmniSOS - Elite WordPress Security</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://omnisos.com/kb/code-injections/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
