Friday 25 November 2011

The vulnerability affects the positioning code


Last week I commented that it had detected a security breach in the functions of many thumbail WordPress templates, well, the reason for writing is that my site was affected by this malicious code and I thought I had repaired all damage caused, but I was really wrong.
A few days ago I sensed that my site had lost much of the presence he had in Google with keywords like " SEO prices "among many others, that others were giving me much of the traffic. By chance, or certainly to do it very often, I clicked on the Google cache to see what articles had been indexed and what was my surprise to see this:
It was something I had not seen since my IP and the other not out of some that Google has, so it was difficult to detect the problem at first glance.
The truth is, find out where this code has not been easy, as you see are links to sites super SPAM penalized by Google: cialis, viagra, tramadol, etc ... so I was penalized by Google linking to these sites.
After much searching and testing have gone into a folder called wp-includes and I saw that there was a file named wp-images.php not previously. Inside that file you will find yourself with a full array of encrypted code so neither are the links detectareis you seek, I've tried to comment on that file from Google Webmaster Tools and I saw that Google does not read any links in my code SPAM .
I have had to send a notice of reconsideration of my website in Google, so I'm waiting to come back where I had to be.
I hope that you will not have passed and if you happened to see if this post helps you.



The link rel = "external" are SEO friendly


Some time ago we see how widespread the use of bonds rel = "external" in wordpress. I have read many comments about how if a new Google tag equivalent to the rel = "nofollow", other than if it spreads PageRank but no value for Google, etc ...
Actually it's much easier is a new feature introduced in WordPress to load the updates target = "_blank" on all links that carry the rel = "external" as shown by the piece of code from WordPress :
externalLinks function () { 
if (document.getElementsByTagName) return; 
var anchors = document.getElementsByTagName ("a") 
for (var i = 0; i 
var anchor = anchors [i] 
if (anchor.getAttribute ("href ") & & 
anchor.getAttribute ("rel") == "external") 
anchor.target = "_blank"; 


window.onload = externalLinks;
This makes it very easy to make all links load in a new browser page and we close our blog, but as you can see, this has nothing to do with SEO and Google ... but there is something positive and thinking is that this tag is like a rel = "nofollow" most webmasters and bloggers / as make use only of the rel = "external" in their comments so we can take advantage of this neglect to place links in the comments manuals ... that Yes, provided that you put the content is original, is now highly penalized to the copied text.

Timthumb.php vulnerability in WordPress function

It is possible that for some days you shall have detected that your thumbnails (thumbails) of your WordPress site have stopped working.
This is because Mark Maunder discovered a vulnerability in the code in timthumb.php that allowed any hacker execute PHP code exploits vulnerabilities in the folder cache that uses the library timthumb.php




Many web hosts or servers dedicated to its users have reported the problem and also have disabled the timthumb.php (especially in hostings) by placing an exit, in the first line of code.
To resolve the vulnerability must comment or delete all the domains that are in the array $ allowedSites .
Also for safety and should disable the global variable ALLOW_EXTERNAL with FALSE being this:  define ('ALLOW_EXTERNAL', FALSE);