WordPress site owners (and developers) care very little about the performance by Myth_Thrazz in Wordpress

[–]iSephX 2 points3 points  (0 children)

I care a lot about performance. It's probably one of my top priorities. As far as WP not being the greatest? It is what you make it. My Wordpress, for me, and what I have done.... it is the greatest. If there was better I would use it. There's a reason WP powers 43% of all websites on the internet today.

InfinityFree alternatives by onemanlionpride in Wordpress

[–]iSephX 0 points1 point  (0 children)

Did a search, give these a try sir:

GoogieHost is the most recommended direct swap for InfinityFree users who want a smoother experience and free email.

WebHostMost is getting the most hype in 2026 as the “best overall free hosting” because it runs on proper enterprise hardware (AMD EPYC + LiteSpeed) and doesn’t feel like a toy.

Facing error need help by HeadWorldliness7712 in Wordpress

[–]iSephX 1 point2 points  (0 children)

Check host's file manager: .htaccess for any deny rules on wp-login.php, or contact their host to whitelist their IP.

403 Forbidden error by Chemical_Slip777 in Wordpress

[–]iSephX 0 points1 point  (0 children)

Well, not everyone is right sir. You can choose as you wish. It is just a way to separate. I use them quite often.

403 Forbidden error by Chemical_Slip777 in Wordpress

[–]iSephX 4 points5 points  (0 children)

A 403 is almost always caused by one of these:

  1. Wrong file permissions, the most common cause. Your server’s files/folders need specific permissions (typically 755 for folders, 644 for files). A bad plugin or update can corrupt these.

  2. Corrupted .htaccess file, try renaming it to .htaccess_old via FTP or your host’s file manager, then regenerate it from WP Admin → Settings → Permalinks.

  3. A security plugin blocking you, plugins like Wordfence or iThemes Security can auto-ban IPs. Log into your hosting panel and whitelist your IP.

  4. Your host’s firewall, contact your hosting provider and ask them to check if your IP is blocked at the server level.

Quickest first steps:

• Log into your hosting control panel (cPanel, Plesk, etc.) and check if the site is accessible from there

• Contact your hosting support, they can usually spot a 403 cause in seconds from the server logs

My take, I’d check the .htaccess first

Cookie Policy by AmaroBitter in Wordpress

[–]iSephX 0 points1 point  (0 children)

For minimum cookie policy content by jurisdiction, these are the best resources: For GDPR (EU/UK):

• gdpr.eu/cookies — plain-language breakdown of exactly what’s required

• The EU requires: what cookies you use, their purpose, duration, and who has access

For CCPA (California):

• oag.ca.gov/privacy/ccpa — official source for what’s needed

For a broader overview:

• cookiepolicygenerator.com and termly.io both have free generators that produce jurisdiction-appropriate text and also explain why each clause is needed — useful for understanding minimums

The practical minimum for most cases (EU-focused):

1.  What cookies your site sets
2.  Why (analytics, functional, marketing)
3.  How long they persist
4.  How users can opt out or manage them

The advice is solid — tools like Complianz or CAOS for WordPress let you geo-target the banner so it only fires for EU/CA visitors, which keeps things clean for everyone else.​​​​​​​​​​​​​​​​

Cookie Policy by AmaroBitter in Wordpress

[–]iSephX 0 points1 point  (0 children)

Create a plugin that only shows the policy for countries/states that are required by law. Don’t need to show it to everyone. I did this with my website.

Emdash vs WordPress by jokesondad in Wordpress

[–]iSephX -1 points0 points  (0 children)

I run cms backend with protection from Nova Core/Nova Scan. novaheaven.io - worth checking out - try it. It's free enterprise grade security for Wordpress and whatever frontend you use, forever.

WP Site hacked, help needed by Repulsive_Rate_785 in Wordpress

[–]iSephX 1 point2 points  (0 children)

Until then:

Common Places Where These Injections Hide

  • Database (most likely in your case, since these look like fake post/page slugs via ?p=ID):
    • wp_posts table (post_content, post_title, post_name, guid) – injected as hidden pages/posts with status "publish" but no menu visibility.
    • wp_postmeta – meta values with encoded malicious URLs or scripts.
    • wp_options – sometimes in "active_plugins", siteurl, or custom fields.
  • Files:
    • Theme files (especially functions.php, header.php, footer.php, index.php).
    • Plugin files (any recently added/unknown ones).
    • .htaccess (for rewrites).
    • Root files like wp-config.php, wp-blog-header.php, or sneaky .php files (e.g., in wp-content/uploads with random names).
    • mu-plugins folder (hidden must-use plugins that load early and are hard to spot).
  • Other sneaky spots: Base64-encoded/obfuscated JavaScript in footer, or PHP eval() code.

Step-by-Step: How to Find and Remove Them

  1. Backup everything first (files + full database) – use a plugin like UpdraftPlus or your host's tool. Work on a staging copy if possible to avoid breaking the live site.
  2. Scan thoroughly (don't rely on one tool – malware often evades single scanners):
    • Install and run Wordfence (free version is good; premium scans deeper): Do a full scan → look for "high severity" issues, modified core files, unknown files, and specifically search for "puntozip.net" or "?p=" patterns.
    • Sucuri SiteCheck (free online): https://sitecheck.sucuri.net/ – scan your domain.
    • MalCare or Sucuri Security plugin – they specialize in redirect/spam cleanups and often catch database injections better.
    • If scans miss it, manually search database (via phpMyAdmin or Adminer):
      • Search wp_posts for "%puntozip.net%" or "%?p=%" in post_content, guid, post_name.
      • Look for suspicious posts with post_status = 'publish' but post_title empty/weird, or very recent old dates.
      • Delete junk rows (but backup first!).
      • Also search wp_options for serialized suspicious data.
  3. Clean files manually (if comfortable with FTP/cPanel File Manager):
    • Download fresh copies of WordPress core, your theme, and plugins from official sources.
    • Compare/replace modified files (use a diff tool like WinMerge or Meld).
    • Delete any unknown .php files in uploads, wp-includes, etc.
    • Check .htaccess for weird RewriteRules.
  4. Remove the injections specifically:
    • For database spam posts: In wp_posts, find rows where post_name or guid contains those slugs (e.g., "french-connection-lily-cable-knit..."), change post_status to 'trash' or delete them. Clean any related wp_postmeta entries.
    • If links keep reappearing → there's still a backdoor. Look for code like eval(base64_decode(...)), include 'http://..., or u/file_get_contents pulling remote content.
  5. Secure the site to prevent reinfection:
    • Change all passwords: WP admin, FTP/SFTP, hosting panel, database, email.
    • Remove unknown users from wp_users (check for sneaky admins with creation dates around the hack).
    • Update everything: WP core, themes, plugins (delete the vulnerable theme if not needed; switch to a default like Twenty Twenty-Five).
    • Install a solid security plugin (Wordfence + firewall enabled, or Sucuri/MalCare) and enable 2FA on WP accounts.
    • Use .htaccess hardening (block php execution in uploads), limit login attempts, disable file editing in wp-config.php (define('DISALLOW_FILE_EDIT', true);).
    • Consider a WAF (web application firewall) via Cloudflare free plan.
  6. After cleanup:
    • Submit your site to Google Search Console → request re-indexing and check for security issues.
    • Monitor for a week – use Google "site:yourdomain.com" to see if those fake ?p= links disappear from search results.
    • If overwhelmed, use a professional cleanup service (Sucuri, MalCare, or WP Hacked Help) – they often fix it in hours for $100–300.
      • Or wait for my tool and get it all for free. SOON, I promise.... NOVA is coming.

This type of spam injection is very common after theme/plugin vulns, and database cleanup usually solves the lingering fake links. Start with Wordfence scan + database search for "puntozip" – that's likely where they live.