After upgrading a bunch of WordPress plugins on a site I noticed that comments were not functional on my site for users that were not logged in. This can always be tricky because if someone reports comments not working to the WordPress site administrator they likely will be logged in when they test the comments and think there is nothing wrong. Anyhow if comments are throwing an error and you have the SI Captcha Anti-SPAM WordPress plugin installed then the below content will assist you to resolve the problem.
Ever attempt to delete the Trash on OSX and run into an error that says you can’t complete the operation because you don’t have permissions to access some of the items? I am not sure how often this will happen to the average user that wouldn’t already know how to resolve the problem since the chances are high that the file or files created with different permissions required you to change to the root user in the first place. Anyhow below is a better description of the issue along with a screenshot followed by how to resolve the problem emptying your Trash on your Mac.
I was going through and cleaning up some plugin settings recently on a WordPress site and received an error when attempting to access Feed Comments Number admin settings page. The error states that you do not have sufficient permissions to access the page though that was not the case because I was logged in as an administrator. Luckily I had run into this exact error awhile back and knew exactly where the problem was. Below I describe the error in more detail and provide resolution to the issue.
When setting up a server or group of servers for the first time you may find yourself wanting to create MySQL users without having to login to MySQL. It would make sense for the mysqladmin command to offer this functionality but it does not. Instead you can create the MySQL user with the mysql command as shown in the below example performed on a server running Ubuntu Linux 12.04 also known as Precise Pangolin.
So earlier today I noticed a discrepancy in traffic to question-defense.com and because of a previous incident I knew exactly where to look. Sure enough a similar attack had been performed which we are coining Search Engine Click Jacking. In this case we are sure that a single files permissions were left open and the attackers were able to write PHP into the file which caused traffic being referred to our site from many of the major search engines to be redirected to tenderloin.osa.pl. Our site is built using WordPress however any site built in PHP with incorrect permissions on any files are vulnerable to this type of attack. Below is more information about the attack, how to search for the attack, and a simple bash script that will remove the infected code from PHP files on your web site.