Skip to main content

Home/ DISC Inc/ Group items matching "Design" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
jack_fox

The Ultimate WordPress Security Guide - Make Your Site Hackproof @ MyThemeShop - 0 views

  • Even if you hand over the security role for your site, you should still have a good understanding of WordPress security – so you can be sure you’re really getting the protection you need.
  • recognize risk signs. A risky product is: Rarely updated – it’s hard to code a security fix for a theme you’ve virtually abandoned Has many bad consumer reviews Lacks adequate support Has a bad history of being hacked
  • how do you know if a theme or plugin has been hacked in the past? You can start by checking wpvulndb – a database that tracks thousands of exploits across a wide range of plugins and themes.
    • jack_fox
       
      Worth adding to plugin selection/research procedures
  • ...10 more annotations...
  • Google is your best choice for finding the vulnerabilities that are not listed in wpvulndb.com. Just type “plugin-name exploit”
  • Insecure plugins and themes are the main WordPress security risks. So it’s extremely important to make careful choices.
  • It’s better to deactivate the plugin than run it. You can either find a replacement or wait until the issue is fixed.
  • If you ever experience a “white screen of death” after updating your plugins, there’s a simple procedure that will fix the situation: Disable all plugins. One by one, activate each plugin you absolutely need Then activate the plugins that are not essential, but have cosmetic value – again, do it one by one Finally, delete the plugins you don’t need
  • Top security pros rely on automated software that scans their networks and sites for weaknesses, notifying them of problems. It gives them the ability to respond quickly. You can do the same with ReScan.
  • Directories should be set to 755
  • all files inside your WordPress installation should have a 644 permission
  • the wp-config.php file should have permissions set to 600
  • You can use .htaccess files to prevent hackers from looking at code they shouldn’t see – including your wp-config file
  • Disabling XML-RPC
Rob Laporte

P2 - The Google Page Experience Update: User experience to become a Google ranking factor - 0 views

  • What it all looks like. When you group these all together, you get this page experience name for all these elements. Google said page experience specifically is not a ranking score, but rather, each element within has its own weights and rankings in the overall Google ranking algorithm.
  • This will go live sometime in 2021, Google promised to give six-months notice
jack_fox

Why Google May Use Core Web Vitals Data From Noindexed Pages - 0 views

  • Google may or may not use the Core Web Vitals metrics from pages not within Google's indexed, pages you may explicitly block from indexing, as part of its overall calculation for the upcoming Google Page Experience Update. John Mueller of Google said he believes this to be the case but is not 100% sure.
Rob Laporte

Shopify Duplicate Content: Fix Multiple Product URLs & More | Go Fish Digital - 0 views

  •  
    "Shopify SEO article"
Rob Laporte

P3 - SEO for Google Web Stories: a comprehensive guide - DeepCrawl - 0 views

  •  
    "stories.google"
jack_fox

How to Find Your WordPress Page ID and Post ID: A Step by Step Guide - 0 views

  • Every piece of content on your WordPress site has an individual ID number. This includes pages and posts, as well as media files, comments, categories, tags, users, and more. These ID numbers help to organize content within your site’s database, and enable you to find, query, and target particular content.
Rob Laporte

Rendering SEO manifesto - why JavaScript SEO is not enough | Onely Blog - 0 views

  • Indexing your content is not a given anymore – you need to earn your place in Google’s index. And it seems to be getting harder over time.
  • Looking at the screenshot above, we can clearly see that the increase in JavaScript indexing came with a price. HTML indexing declined and this is why so many webmasters reported seeing a decline in the number of their pages indexed.
jack_fox

Official Google Webmaster Central Blog: Evaluating page experience for a better web - 0 views

  • The ranking changes described in this post will not happen before next year, and we will provide at least six months notice before they’re rolled out.
  •  
    "The ranking changes described in this post will not happen before next year, and we will provide at least six months notice before they're rolled out."
Rob Laporte

FAQ: Google's Popular Products and how to increase your organic product visibility - 0 views

  • With greater competition coming from marketplaces like Amazon, Google is adding more product discovery features to its search results pages.Here is everything you need to know about Google’s Popular Products section.
  • For now, this feature is only available for apparel and fashion products.
  • The Popular Products feature relies on tools you may already be using for your Shopping campaigns and rich results: product feeds and product schema.
  • ...1 more annotation...
  • Can I measure traffic from Popular Products?
Rob Laporte

Free Google product listings expand to knowledge panels - 0 views

  •  
    "Popular Products"
jack_fox

Server Security Requirements and References: Information Technology - Northwestern University - 0 views

  • Each and every recommendation will not be applicable to every server; therefore the system administrator should exercise their own judgment in conjunction with their department's own requirements and business needs. Deviations from the recommended guidelines should be documented
  • if a department is required to comply with PCI (Payment Card Industry) regulations, the specific recommendation has been labeled with "PCI/DSS"
  • All local and domain accounts with privileges above normal user level should have a minimum 15 character passphrase and must be changed at least once every quarter.
  • ...9 more annotations...
  • Machines may not be connected to the network until they have had the latest OS and application updates applied, anti-viral software installed and activated, firewall enabled, AND a strong passphrase enabled on all accounts.
  • Departments must establish, maintain, and effectively implement plans for emergency response, backup operations, and post-disaster recovery for organizational information systems to ensure the availability of critical information resources and continuity of operations in emergency situations.
  • Encrypted backups should be taken regularly, and all on/off site storage should be physically secure.
  • Clocks must be synchronized to two (2) internally hosted time servers
  • RedHat Linux
    • jack_fox
       
      Closest to CentOS, the distribution of Linux that FutureHosting uses
  • Encrypt all non-console administrative access. Use technologies such as SSH, VPN, or SSL/TLS (transport layer security) for web-based management and other non-console administrative access.
  • Logs must be available online (electronically) for three months, available on tape (or other removable media) for one year.
  • Establish a process to identify newly discovered security vulnerabilities (for example, subscribe to alert services freely available on the Internet). Update standards to address new vulnerability issues.
  • Remove inactive user accounts at least every 90 days.
jack_fox

How to write great Schema Markup for your Company - 0 views

  • Google (and Microsoft) can also read your markup if it is in an external file that loads after the page has loaded. For very large sites and for sites that make extensive use of Schema markup, this is a solution that can potentially make managing the structured data much easier
  • this is the very least you should include) The type of company The company name Official website Address The official logo The preferred description The social accounts The unique identifying URL
  • Ideally, you should choose the same category you have in Google My Business. However, as My Business and Schema.org do not use the same categorization, that is not always possible. Choose the closest match.
  • ...3 more annotations...
  • If you do not find the right category for your business, you can actually create it. Just find the Wikipedia page that represents your business category, add that to this URL http://www.productontology.org/doc/ and add an "additonalType" to your markup.
  • You may be tempted to use your homepage as a unique identifier for your company. However, the homepage (http://www.example.com/) typically "stands for" three things: The home page The whole website The organization
  • Dedicated subdomains, and URI for each entity - product / person / company / place / office with Schema-compatible anchors for "explaining" the details is the only system that will work over time. 
Rob Laporte

SEO Starter Guide: The Basics | Google Search Central - 0 views

  • To tell Google not to follow or pass your page's reputation to the pages linked, set the value of the rel attribute of a link to nofollow or ugc. Nofollowing a link means adding rel="nofollow" or a more specific attribute such as ugc inside the link's anchor tag, as shown here:
  • Use the HTML <img> or <picture> elements
« First ‹ Previous 621 - 640 of 667 Next › Last »
Showing 20 items per page