Toggle powerful hardening rules for Apache/LiteSpeed: bot blocking, directory/privacy protections, headers, XML-RPC controls, SQL-injection mitigations, and more—built to play nicely with real sites.
Harden-It helps close gaps WordPress doesn’t address by default. It applies curated server rules and headers for Apache and LiteSpeed hosts, with per-rule toggles so complex sites can enable only what they want.
Toggle-based Safe defaults Headers Anti-bot
Feature | Description |
---|---|
Toggle Security Rules | Activate or deactivate each rule—great for complex sites that need flexibility. |
Block access to .htaccess /.htpasswd | Protect critical config files from direct web access. |
Bad-Bot Filtering | Add/remove disallow rules to hinder known malicious crawlers. |
Disable Directory Listings | Prevents snooping and casual reconnaissance. |
Shield Sensitive System Files | Deny access to logs, wp-config.php , php.ini , and similar. |
Block Author Enumeration | Stops ?author= based user-ID probing. |
Protect .ini files | Block reads of configuration files in web scope. |
Protect wp-config.php | Prevent direct download of DB credentials and salts. |
Restrict xmlrpc.php | Disable or limit access to reduce DDoS/pingback abuse. |
Spam Comment Shield | Block off-domain comment posts; optionally redirect offenders. |
Block Blank UA/Referrer/Host | Drop suspicious POSTs lacking basic headers. |
General Bot Protection | Reduce scraping, cheap DDoS, and resource drain. |
No PHP in Uploads | Stop execution of uploaded PHP in /uploads . |
Hide Backups & Sources | Block access to source/backup artifacts. |
Block .zip Access | Prevent bulk downloads of packaged files. |
Anti-Clickjacking | Send X-Frame-Options to stop iframe embedding. |
Security Headers | Add X-Content-Type-Options , X-XSS-Protection , Strict-Transport-Security , etc. |
SQLi Mitigations | Common injection patterns filtered at the server layer. |
Anti-Hotlinking | Stop other sites embedding your assets directly. |
Disable XML-RPC Pingbacks | Reduce reflection abuse vectors. |
Hide Server Signature | Avoid leaking server version details. |
Disable ETags | Improve caching; avoid inode leakage. |
Disable TRACE | Mitigate cross-site tracing issues. |
Force HTTPS | Redirect HTTP→HTTPS for secure transport. |
Block File-Injection Patterns | Drop suspicious query strings commonly used in exploits. |
Admin by IP (Optional) | Restrict /wp-admin by current IP. Use with caution—changes in IP/VPN will block you. |
Extra helpers for hardening and maintenance:
wp-config.php
: Adds DISALLOW_FILE_EDIT
, and optional WP_HOME
/WP_SITEURL
defines.Harden your site with safe defaults and smart server rules.
© 2024–2025 DrGlenn. All Rights Reserved.
Visit fixmyhackedwebsite.com for professional help.