tomdkat
Forum Replies Created
-
Forum: Plugins
In reply to: [BruteProtect] Questions about BruteProtect and brute force attacksI’m now seeing more and more login attempts getting past BruteProtect. If there’s an email account at which I can contact someone, I can provide more detailed information about what I’m seeing.
Thanks!
Merry Christmas!
Peace…
Forum: Plugins
In reply to: [BruteProtect] Questions about BruteProtect and brute force attacksThanks for the info. With regard to question #3, does this mean that if BruteProtect encounters a login attempt from a IP address it doesn’t currently think is “bad”, it will send that IP address info someplace for analysis and hopefully block subsequent login attempts, from that same IP address?
I just encountered a bad login from an IP address in China. My firewall detected the brute force login attempt and I’m not sure what BruteProtect did with it. The login attempt DID get logged in the same manner the attempts got logged before I installed BruteProtect, which means the login attempt wasn’t blocked at all.
Thanks!
Peace…
Thanks for the reply. My wp-login.php page shows _only_ the username and password fields and no “Lost your password” link at all. So, that must be related to why I’m not actually going through the password reset function.
As for the verified IP address, yes I realize that I have to go through the password reset function to get the IP address verified. I think somehow having the ability to get a valid IP address verified, outside of the password reset process, would be great. I fully understand preventing “bad” IP addresses from being verified, which makes verifying IP addresses outside of the password reset process difficult. I imagine if one’s email account was compromised such that password reset messages were being intercepted, a hacker could subvert the verified IP address feature and get a “bad” IP address verified.
In any event, if my current IP address had somehow been verified, I wouldn’t have had the login problems I did. I don’t think it would be prudent to reset my WordPress password each time my IP address changes (since it doesn’t change very often) but that might be one option. I’m just thinking out loud. 🙂
So, now I’m off to figure out why the ‘Lost password’ link doesn’t appear on the wp-login page.
Thanks again!
Thanks for the reply. The user name I entered was the same user name being attacked, so I know the user name was correct. Otherwise, I wouldn’t have had any login issues. 🙂 This is the same user name I’ve been using for well over a year.
The email address associated with the user account in question is the same email address to which the notification messages were being sent. I accessed the database using another means to confirm this info. Something else I noticed, when I look at the main WordPress login page, I DO NOT see any “forgot password” link so maybe that’s related to my not getting any messages about resetting passwords.
In any event, I managed to login to my account. I took other measures to thwart the attack, waited a few hours, cleared the “force password reset” flag, and then I was able to login. During all this, I found it would have been nice to somehow get my current IP address logged as a validated or verified IP address, especially since the attack was coming from IP addresses not associated with my ISP and from which there had never been a previous successful login.
So, thinks are ok for now.
Thanks!
Oh yeah, I forgot to mention. I _do_ receive the “Potential Intrusion” and “Verify you logged in” email messages, just not any messages with links to reset my password.
Thanks!
Thanks for the feedback!
Peace…
Thanks for the info! Does the Pro version support multiple fields?
Thanks!
Peace…
Ok, this issue has been resolved. Apparently, the parent DIV of the image I added uses absolute positioning and had a “top” position of 1px. This caused one of the gaps I encountered. I was able to deal with that by adding a rule to my theme’s stylesheet that effectively “overrode” the position of the parent DIV by moving the image up -2px.
I don’t know if another release of Optin Revolution will eliminate the need for this but I’m happy for now. 🙂
Thanks!
Peace…
Forum: Plugins
In reply to: [Popup with fancybox] Has difficulties with W3 Total Cache, a suggestionAh, great observation! I also use W3TC and I didn’t think about the impact that would have on the popup behavior. Would it be possible to have W3TC ignore the Cookie used by popup with fancybox?
Peace…
Forum: Plugins
In reply to: [Popup with fancybox] Only onceYes, I would like this as well. For me, popup with fancybox won’t appear when I view the other pages of my WordPress site but each time I visit the home page, the popup appears.
Peace…
Thanks for the reply! I’ll submit a ticket soon!
Thanks again!
Peace…
Forum: Plugins
In reply to: [Simple Login Log] Question about the "data" columnI’ve figured out why the data in the “data” column is effectively truncated. There’s a check to see if an “excerpt” of the data column data should be shown or not. I reversed the logic and now I get the info I need. 🙂
Peace…
Forum: Plugins
In reply to: [BulletProof Security] Enhancement requestThanks for the reply and thanks for looking into this! 🙂
Peace…
I don’t have any answers for you but one of my blogs is currently being attacked as well.
Peace…
Forum: Fixing WordPress
In reply to: Question about WordPress user accountsOn another WordPress blog I maintain, I’ve also seen the high number of subscriber accounts being registered. In the case of the site I mentioned above, there haven’t been any account registrations from visitors and there’s only one administrator account, which is the way I configured things. I just setup accounts to use for other site maintenance tasks. It’s just odd that the account I don’t use for blog posts was the account used for the attack.