How to disable or noindex WordPress attachment pages?

Attachment page is the built-in feature of WordPress. When these pages are not handled correctly by the website owner, Google and other search engines will index them. WordPress attachments are thin pages that don’t add any value to a blog. These pages should be used only on personal or photography blogs wherein you want the visitors to comment on the pictures, videos, and other media files. WordPress doesn’t provide an option to turn off or disable these pages. However, you can use third-party plugins to manage them. ...

October 5, 2017 · 2 min · 367 words · prhost78

Lessons Learned using Drupal’s Domain Access Module

Over the last few months my team has been developing microsites to accompany our main website. The requirements for these sites included having their own domain, theme and separate content. After reviewing options in Drupal 7, I decided the best approach given our situation was to use the Domain Access Module. The Domain Access Module provides a very solid and powerful framework for developing additional sites within your existing Drupal CMS, but it can also be somewhat complicated to setup for any given use case. I have documented some of the lessons learned over the last few months as we implemented Domain Access in our own project. ...

October 3, 2017 · 6 min · 1135 words · icarnaghan

Data Hiding and Steganography

The term ‘Steganography’ refers to ‘covered writing’ and encompasses methods of transmitting secret messages through innocuous cover carriers in a manner that their existence is undetectable. Johnson & Jojodia (1998). For years hackers have been finding more innovative ways of hiding data within existing systems usually for the purpose of transporting it to a target destination. The term ‘carrier’ often refers to a type of common file that covert information can be embedded in unknowingly to anyone else. Kessler (2007) discusses the fact that any form of digital information can be stored inside many types of carrier files, including image, audio, video and executable files. Digital forensics tools can be used to scan carriers to determine whether or not suspicious information lies underneath the surface. ...

September 28, 2017 · 2 min · 339 words · icarnaghan

Preparation Phase of a Digital Search

The preparation phase of digital search is the most important phase of the digital investigation process. If not carried out correctly, the can lead to improper handling of evidence that may lead to damage of crucial materials to an investigation. This phase involves the preparation of tools, techniques, search warrants, and monitoring authorizations and management support. Venansius & Tushabe (2004). It is therefore important that adequate resources are allocated to the preparation phase. Beebe & Clark (2007) elaborate more on this phase as the process of preparing tools and equipment, honing forensics skills, and continuing to become educated about on new technologies and tools that may be useful in dealing with the incident. ...

September 28, 2017 · 2 min · 289 words · icarnaghan

InstaShow Instagram feed plugin review (2018)

InstaShow is a premium WordPress plugin that allows you to integrate the Instagram feed on your website. It has registered 6000+ sales on the ThemeForest marketplace. It is a highly customizable plugin that has a rating of 4.87/5. InstaShow is cheap and it provides amazing features. If you own a photography, product review website or a food blog, you can get more Instagram followers by installing this plugin. The Instagram widget provided by InstaShow is a great alternative to a gallery or featured image widget because it saves server resources. Instead of uploading pictures on your server, you can share your images on Instagram and configure InstaShow to display the pictures in a nice interface. ...

September 21, 2017 · 4 min · 723 words · prhost78

Important Cybercrime Laws

There are a number of cybercrime laws that are extremely important in the field of digital forensics and cybersecurity as a whole. Two of the most important laws include the Computer Fraud and Abuse Act (CFAA) of 1984 and the Electronic Communications Privacy Act (ECPA) of 1986. The original intent of CFAA was to address computer related crimes and more specifically protect information assets. The law made it a federal crime to gain unauthorized access to data or information on protected computer systems. It does not come without criticism. Kerr (2009) made many points that the current law is too vague stating that CFAA has become so broad, and computers so common, that expansive or uncertain interpretations of unauthorized access will render it unconstitutional. Nevertheless, the law has been a cornerstone for shaping the way we deal with cybercrime and since its introduction, has been since amended a number of times. ...

September 19, 2017 · 2 min · 319 words · icarnaghan

Yet More Theft of Information Assets

It doesn’t seem that long ago that I received an official letter in the mail from the United States Office of Personnel Management (OPM) detailing that sensitive information about me had been compromised. I had been following the news and knew about the breach, so the letter didn’t come as a huge shock. It did make me think about the impact of such a breach, originally reported as affecting 4 million individuals, later estimated to have compromised sensitive information of 21.5 million. Christensen et al (2015). Just this past week I once again learned, along with the majority of the country, that with high probability my identity along with millions of others had been stolen in another data breach. It has since come to light that the cause of the breach was unpatched systems affected by Apache’s open-source Struts software, a vulnerability that should have been mitigated months before the breach took place. Brandom (2017). ...

September 19, 2017 · 2 min · 364 words · icarnaghan

Top 4 Best free WordPress migration plugins (2018)

Even though I have a technical background, I was not comfortable in moving my sites during my initial days of online career. At that time, 2 of my biggest worries were: Incorrect site configuration can lead to tons of soft 404 or 404 errors. If DNS isn’t configured correctly, search bots and visitors would fail to access my sites. I started my online journey in May 2013. I’ve changed my hosting platform and moved my websites several times in the last four years without losing website traffic. Right now, my websites are hosted on an unmanaged Linode cloud server. Before switching to Linode, I used Digital Ocean. To move my sites, I follow the below steps: ...

September 8, 2017 · 5 min · 864 words · prhost78

Avada Theme review: Is it the best premium WordPress theme?

Avada is a top-rated premium WP theme, which you can download from ThemeForest marketplace. There are plenty of free themes that haven’t surpassed 1000 downloads. Interestingly, Avada has 300K+ users. It is not only best-selling WordPress theme on the ThemeForest market place but also the most popular premium WP template. Themeforest is a marketplace where developers across from various parts of the world publish their products. As the ratings and reviews are not in control of theme and plugin developers, you can consider ThemeForest as a transparent marketplace. ...

August 21, 2017 · 6 min · 1103 words · prhost78

Bulk move noindexed posts from All in One SEO to Yoast

The Yoast SEO plugin includes an option to import meta description and title tags from other popular plugins. While using other plugins, you may have noindexed or nofollowed some or several posts. There are a couple of plugins that enable you to move settings from AIOSEO to Yoast. Unfortunately, none of the plugins provide an option to bulk move noindex posts. People noindex posts to recover from Google quality updates or prevent penalty during an algorithm update. ...

August 9, 2017 · 2 min · 396 words · prhost78