Thursday, November 29, 2012

ADDING A CONTACT PAGE IN BLOG


Contact Us form is always prove it self important for any publisher.Its an important way to communicate with your visitors in a convenient manner.Not only it will help you to improve your services it could also make your community more reliable as user will able to communicate with you live with out any barrier.But Blogger does not provide this service you have to work a bit to make it working for you.In Blogger users can communicate with comments but they cannot send you a private message so its better to have a contact us form to make personal stuff private.So today we will learn How to add a contact us form in blogger before we start adding it lets look at its features

  • Its Free to use no need to spend a single penny
  • Its have anti spam protection in form of Captcha to stop spamming bots
  • Send and receive unlimited forms
  • Stylish Contact us form with mouse over hover 
  • Email Required to stop spamming
  • Don't need any registrations
Its very important to have a contact us form as user use it to send there feedbacks regarding your services.So adding a contact us form is a smart move to make your audience feel the this community has good standards.So let us start working with out wasting any time
       

1.Setting Up Contact Us Form
Go to http://www.foxyform.com/ and select the fields you want in your contact us form i.eTitle,Name,Subject,Email.You have to specify which fields are required. These required fields must be filled out by the user or the form will not be submitted.

2.Doing Advance Setting (Working on Forms Look)
Now in this step you have to customize the look of your form fine tuning the look according to your website.Select Background Color,Font Color,Font and Font size and proceed to next step


3.Target e-mail address:(Where You Will receive Contact Messages)
Now you have to insert your email address when ever any user will contact you an email will be dispatched to your email address.and now press Create Formular to get the html embed code

http://www.softwaresuneeds.blogspot.in/

4.Creating a Contact Us Page in Blogger:
As you have a embed html code now you just need to  create a contact us page.To create it go to Blogger.com >> Page >> Create A Page >> And Paste the embed code in the post description give a title to post and publisher the post


Windows 8 Store Metro Apps Cracked





Windows users have always leaded an unrestricted life. Then, why will they compromise with Windows 8. This was bound to happen, how can Windows 8 store Metro apps remain uncracked.


Everyone knows that eventually, hackers will find a loop hole and bring a working crack for Windows 8 App Store. And something similar happened.
Hacker at MDL Forums has released a tool thanks to which any trial app downloaded from Windows 8 Store apps can be converted into full version for free.
Some developers offer a trial of a paid app on Windows 8 App store. These can be used for a certain period of time say 7 days or so. After which, they stop working and you will have to purchase it in order to continue using the application.
Tool called wsservice_crk_src can break this restriction and lets you use the application forever.

How it Works

Take an example of iPhone where you will have to jailbreak in order to install cracked apps (Paid apps for free). It is similar to that. Some Windows 8 system files are patched to crack Windows 8 App store security. Windows8Core called it Modernbreak.
Also, the files of app are modified which includes signature, license, documentation, etc. Codes in Apps are modified in such a way that it no more prompts you for buying when trial period ends.
  • Reset Trial Software and Extend Evaluation period to Run Forever

Can we get Apps with BUY only option for free

It’s only available for those apps which are being offered as trial. You cannot get the BUY version of app for free. Maybe, it is possible through sideloading in which full version of app can be installed without app store.
Also, Hacker has included a feature called “Make Redistributable” in his tool. If you have purchased an app from Store, you can prepare a redistributable application which can be installed on any system using sideloading.

How to use Crack Tool

Out of curiosity, I tried the tool to convert trial version of a Windows 8 app to full version. Tool is quite sophisticated, It is just a one click process.
crack metro apps Windows 8 Store Metro Apps Cracked: Paid Trial Version Becomes Full
  1. Install the tool according to system architecture (x86 or x64)
  2. Install the trial app from App store.
  3. Run the crack tool and select the app.
  4. Click Crack and the app should be unlocked.

Will I be able to Update

Cracked app won’t be liable any more to receive free updates from App store. Reason is obvious that Microsoft will check the signatures before delivering updates. And the installed app has everything modified.
Still, there is a workaround for it. You may uninstall the cracked app completely and reinstall app from Windows 8 store. Now, crack it again using the same method.

Can Windows RT Apps be cracked

No. The tool is a Win32 application so, it won’t run on Windows RT as it is based on ARM architecture.

Should you Try it?

I would recommend not trying it. Not only because it is against Microsoft’s policy but also it is risky. Patching requires some knowledge and you are risking your Computer’s security and privacy to a 3rd party software. By chance, if you get caught by Microsoft, your Windows account may get closed.

Personal Thoughts

This is a second big blow to Microsoft after a loop hole discovered in their giveaway which did Windows 8 permanent activation for free. Hope, they release an update patch to fix this loop hole.
On other side, I think it is unstoppable because Piracy is inherent in digital world. Every action will have an equal and opposite reaction.

Wednesday, November 28, 2012

How To Sign Up With Email ID Which Is Already In Use

While creating a new online account, signup form generally throws an error that username already exists or Email is already taken. Though, there is no solution for username (apart from changing) but this article can help you signup using the same email ID which is already in use or taken by another user.



Solution lies in your email ID itself and what all you need is a Gmail ID to make this trick work.
Do you know that your one Gmail ID is equal to unlimited number of email addresses.
This is because Gmail doesn’t care about dots (.) or capital letters in email ID. An email address with dots is same as the one without dots.
For example, if your email ID is akshay.india@gmail.com, it is same as akshayindia@gmail.com.Any message sent to any of those addresses will land in the same inbox which belongs to you.
umlimited gmail IDs How To Sign Up With Email ID Which Is Already In Use
While signing up for new account, if you see an error saying “email has already been taken”, just add or remove dots from gmail ID and continue signing up.
Reason: Website you are signing up considers akshay.india@gmail.com and akshayindia@gmail.com as two different email IDs. So, it lets you create new account with it. Any email notification sent by them reaches the same inbox.

What’s the use?

  • You can create multiple Facebook (or any other) accounts using same Email ID
  • Use the same email ID when old account was banned from service. This generally happens on forums.
  • Continue extending Trial of software when they offer certain period of time per email ID.

Some More Fun Facts About Gmail Address

As I said, Gmail completely ignores any dot (.), it is not only about adding or removing dot. You can create any combination of email addresses by adding/removing dots after any character.
  • akshay.india@gmail.com = a.k.s.h.a.y.india@gmail.com, akshay.i.n.d.i.a@gmail.com and so on.
Also, it doesn’t care if the characters are capital or small.
  • akshay.india@gmail.com = AKSHAY.INDIA@gmail.com, Akshay.India@gmail.com and so on.
Replace Gmail with Googlemail
  • akshay.india@gmail.com = akshay.india@googlemail.com
In this way, you can create any number of combinations to generate hundreds of Gmail IDs in seconds without even signing up. Just take care that characters aren’t misspelled.You can refer Gmail support for more information.

For Outlook Email Users

If you are not Gmail user, you can still avoid this error “Email already exists”. For users who upgraded to Outlook from Live ID also have two aliases of their email address. They can use outlook instead of Live in their ID.
  • akshay.india@live.com = akshay.india@outlook.com
That’s how you can save your time and efforts creating new email account to signup as different user.

How To Increase our PC Hard Disk Working Speed?



Hii friends today i m posting some thing realy useful for PC users this is the trick to increase your hardisk speed means.

It Will do this things faster
* Quick Coping
*Play Or Run any File Quickly
*PC will Start in No time.
Etc
This trick is very easy and dont have anty risky work
This tip is only recommended if you have 256MB RAM or higher.




Follow these steps:
* Open Run Command –> Start –>RUN
* Type  SYSEDIT.EXE
   This will open system editor window
* Expand the system.ini file window.
* Scroll down almost to the end of the file till you find a line called [386enh].
* Press Enter to make one blank line, and in that line type
   Irq14=4096

Note: This line IS CASE SENSITIVE!
* Click on the File menu, then choose Save.
* Close SYSEDIT and reboot your computer

Done.  Speed improvement will be noticed after the computer reboots.
Extra Points: The most speed improvement is visible with IDE drives; however there are reports that this tweak also does good for SCSI disks. In any case, it won’t harm your system, so don’t worry to try it and post any comments here.

Tuesday, November 27, 2012

Windows 7 Hacks You Must Know

If you are looking for Windows 7 hacks, I am sure you can finds loads of them on web. What matters is, how many of them are really important. Do you think unlocking the Taskbar in Windows 7 is something very exciting? Obviously, not for the majority of users its nothing cool. Instead if you are interested in Windows 7 Hack that can help you to get rid of expiry date, remove watermark, or disable send feedback link then my article can surely help you out. I organized a set Top 11 Windows 7 Hack You Must Know. This list includes some of the handy posts on Windows 7 hacks in our blog. I have also provided the sources where you can find the hacks.

1.  How to Get  Windows Vista-Style Taskbar in Windows 7

It's hard to deny that Windows Vista scores high on appearance. Here's your chance to give the Windows 7 a Vista look. Just follow the steps mentioned below
Step 1: Right-click on the taskbar and choose the properties dialog. Select the small icons checkboxStep 2: Under the taskbar buttons setting, choose combine when taskbar is full. Although it’s not pixel-perfect in accuracy, but, it’s close from a functionality point.

2. How to Change Windows 7 Log On Screen

If you don't want the same old blue log on screen for your Windows Vista, here's what you gotta do. Go ahead with the steps below.

Step 1: Download  the file - http://www.mediafire.com/?e9y3j3vme0wStep 2: Click on Save and save the .zip file to the desktopStep 3: Open the .zip file and extract the .reg file to the desktopStep 4: Right click the .reg file (On Desktop) and click on Merge.

Step 5: Click on Run, and press Yes, Yes, and OK when promptedStep 6: Save the custom .jpg image you want to use to the desktop with the name backgroundDefault.jpgStep 7: Check to see what your primary display screen resolution is. (You can do it by right clicking on any empty space on your desktop and choose screen resolution and then actuate it with your monitor's specification.)[NOTE: For example, mine is 1920 x 1280.]Step 8: Open Paint, and click on the File icon (top left corner), Open, and navigate to and select the .jpg image from step 6.[NOTE: You can open Paint by typing mspaint.exe in the Start menu search line]Step 9: In Paint, click on Resize, dot Pixels, uncheck Maintain aspect ratio, then resize the .jpg image to the screen resolution size in step 7 (whatever be yours)Step 10:Save the .jpg file to the desktop with the exact file name below with the screen resolution size of the image. When completed, close PaintStep 11: In Windows Explorer, navigate toC:\Windows\system32\oobe\info\backgroundsStep 12: Copy and Paste the .jpg files from step 10, and from step 6 into the C:\Windows\system32\oobe\info\backgrounds folder, then close the windowStep 13: You're logon screen is now changed. You can press Ctrl+Alt+Del to test it. Click on Cancel to return to the desktop.[NOTE: You can now delete the .reg and .zip files on the desktop if you like.]

3. How to Unlock the Windows 7 Hidden Themes


The Windows 7 beta has a pack of hidden and locked themes. Let's see how you can unlock the hidden themes.
Step 1: Open the Explorer (Windows + E) and go to C:\Windows\winsxsStep 2: Enter *.theme into the search field. Alternately you can use the * sign on the number block.Step 3: You'll get the Click me promptStep 4: Double-click the themes ZA, US, GB, CA, AU to install them.


4. How to Enable the Windows Aero in Windows 7


If you were looking for the best designed and most transparent Microsoft user interface then you can't escape Windows Aero. Here's a hack to enable Windows Aero in Windows 7. But before you proceed with the steps keep a backup of your registry.
Step 1. Click on the Start Menu and type “regedit” into the search box. When the program appears click to open the regedit.exe icon.Step 2. Locate the Key belowHKEY_CURRENT_USERSoftwareMicrosoftWindowsDWMStep 3. Look to the pane on the right of the key hierarchy. Right click on the white area and select New > DWORD (32 bit) Value.Step 4. As the value appears name it UseMachineCheck.Step 5. Repeat and create 2 more DWORD Values, Blur and AnimationsStep 6. First double-click the value just created with the UseMachineCheck and enter 0 in the Value Data box. Do the same for Values Blur and Animations. Then click OK.Step 7. Now close the Registry Editor.Step 8. Open the Start Menu and type “cmd” into the search box, right-click on cmd.exe when the program appears in the search results. Now, select Run as Administrator from the drop-down.Step 9. As the Command Prompt opens type the commands below
i) Net Stop uxsms – this command will stop the Desktop Windows Manager Session Managerii) Net Start uxsms– this command will restart it
Step 10. Once you close the Command Prompt. Right click on the desktop and click on Personalize from the menu.Step 11. Click on the Window Color and Appearance in the Personalization Windows Aero the Color Scheme menu.


5. How to Enable the Quick Launch Bar in Windows 7


It is a surprising to see that the Quick Launch Bar has not been enlisted in the easy to enable list. Here's what you gotta to do to enable the Quick Launch Bar.
Step 1:Right-click on the Taskbar and select Toolbars > New Toolbar from the menu.Step 2: Copy and paste the address provided below into the Address bar
%SystemDrive%Users%username%AppDataRoamingMicrosoftInternet Explorer
then click the arrow to the right of the Address bar to navigate to the folder.
Step 3: Select the Quick Launch folder listed and click the Select Folder button


6. How to Remove Send Feedback link in Windows 7


The bug that troubles the window in Windows 7 is the send feedback link. This is a simple fix to get rid of this pique. Make sure you have a backup of the registry before you proceed.
Step 1: Click on the Start Menu and type “regedit” into the search box, click to open the regedit.exe icon when the program appears.Step 2: Look for the following Key HKEY_CURRENT_USERControl PanelDesktopStep 3: Right-click on the white space in the In the pane to the right of the key hierarchy and select New > DWORD (32 bit) Value.Step 4: Now as the value appears name it FeedbackToolEnabledStep 5: Double-click the value that was created with FeedbackToolEnabled and enter 0 in the Value Data box, and then click OK.Step 6: To effect the changes Log off the computer and log on to the system.


7. How to Start Windows Explorer from ‘My Computer’


For those who are in the habit of customizing the Windows for convenience and fun can try this out on Windows 7. With this hack you can set the indows Explorer to start from My Computer instead. This will help you to access the different hard disk drives or removable disks easily. Let's go through the steps
Step 1:  navigate to Windows Explorer in the Start Menu (it’s in the Accessories folder). Then edit the properties and change the target to read:%SystemRoot%\explorer.exe /root,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}
This will make the explorer open folders/drives in new Windows. To fix this see the next step
Step 2: Set the target to
%SystemRoot%\explorer.exe /e,::{20d04fe0-3aea-1069-a2d8-08002b30309d}



8. Remove Watermark from Windows 7 beta 1 Desktop


Windows 7 is in its beta version and you can realize it well with the lapses in the operating system. One such annoying feature with the OS is the water mark embedded in the desktop. To remove the watermark you can follow the steps below. Before beginning with the steps you need to ensure that the User Account Control is disabled.
Step 1: Click on the Start Menu> Control PanelStep 2: Click on User Accounts. Change User Account Control Settings and adjust the slider so that it is at the bottom of the screen (Never Notify).Step 3: Next restart the computerStep 4: After the rebooting browse to the following directory
C:WindowsSystem32en-US

Step 5: Once you’re in the directory locate and right-click the following fileuser32.dll.muiStep 6: From the drop down menu select the properties. Click on the Security tab and click on the Advanced button at the buttom.Step 7:  In the Advanced Security Settings window click on the Owner tab  and click Edit.Step 8: Click OK to effect the changes and return to the original file Properties window.Step 9: Under the security tab, Click Edit.Step 10:Select Users and a checkmark to the all the checkboxes giving you full control of the fileStep 11: Rename user32.dll.mui to user32-backup.dll.muiStep 12: Download the patched version of the files - 32 bit Download or 64 bit DownloadStep 13: After the files have been downloaded extract it from the original directoryC:WindowsSystem32en-USStep 14: Restart the computer


9. How to Uninstall Internet Explorer for Good

This is for those users who never need to use the Internet Explorer. Just follow the steps below to uninstall IE
Step 1: Click on the Start Menu and move to the Control PanelStep 2: Select the Programs and FeaturesStep 3: Click on Turn Windows features on or off link located on the left paneStep 4: The Turn Windows features on or off window appears. Uncheck the Internet Explorer 8 and click OKStep 5: After a couple of restarts Internet Explorer should be gone for good

10. How to Enable Recording in Windows 7


In windows 7 the WaveMix and SterioMix are disabled by default. I'll let you the hack to activate the recording device. Here are the steps
Step 1: Right click on the speaker icon. Now look for the Recording Devices and select it.Step 2: Now right click and select the option Show Disabled DevicesStep 3:Select the Wave Out Mix device and Enable it. Click on Set as Default Device and open up the Audacity.


11. How to Get Rid of Windows 7 Expiry Date

Install the TimerNuke patch to remove the files associated with activation. It will disable the related services. So you can continue with the Windows 7 even after the activation timeline is over. Just download the patch and install.

15 Tips to Stop Facebook & Email Hackers Disturbing Your Life



Its true. When your Facebook, blog, email or bank accounts get hacked your life can be ruined. Some of us spend our entire existences online and such a breach can have terrible effects. You can have money stolen, personal details hijacked and, as happened to me, spam emails sent out to hundreds of high profile clients.
Just a month ago my Facebook and secondary email accounts were hacked while I was on holiday in India. It was my fault.
In this article I am going to give you some simple ways that you can boost your Facebook and email security and stop hackers from ruining your life. Please share this post around as this event was seriously traumatic, I’d like to help people prevent it.


Facebook and Email Security tips to stop hackers


Here are some of the very minimum things you should do if you want to stop hackers from ruining your life. The sad thing? You can probably do all of these things perfectly and still get hacked.
  1. Different passwords
    Every single account should have a different password. Never ever have the same password for an insecure site like Facebook and something important like your online banking.
  2. Complex passwords
    If your password is less than ten characters long, a mixture of upper and lower case letters, numbers and symbols then it is not strong enough. It must never be a name, birthday or information about someone or something around you. An example of a strong password is something like “ca#T_on+M
  3. Complex usernames
    I bet 95% of you have your email address or name as your username? Bad move rookie. You should make your usernames as complex as your passwords. Many WordPress blogs are set up with the default username of “admin” so hackers are already 50% of the way there. Change your usernames to something complex and unrelated.
  4. Updated anti-virus software
    You need to have an updated version (or two) of the latest anti-virus and anti-spyware programs. There are free ones like AVG or paid ones like Norton. Get one and update it automatically.
  5. Latest Chrome, Firefox, Internet Explorer, Safari versions
    Don’t just ignore that update request from your browser, do it right away. Some of those updates are security ones. In fact, keep up to date as to which is the most secure browser and just use that. Hello Chrome?
  6. Use Facebook and email securely with the right URL
    Go log in to Facebook. Go on, do it. Now, does the URL say “http://” or “https://”? If it is the former then you are not in a secure session. Go in to your settings and make sure it always uses https:// and whenever you log into any website make sure you type the “s” if you are logging in.
  7. Don’t use public free Wi-Fi
    You know when you go to a cafe and log on to the free network? Well, take a look at how easy it is for people to steal your Facebook and email passwords using a simple Firefox plugin. Its really sad that this type of stuff exists. I just don’t use Wi-Fi anymore.
  8. Don’t send passwords or store important information online OR offline
    Don’t send secure information over the net at all. Especially through chat or email. If someone has got into your account without you noticing they might be monitoring what you are doing. If you need to send passwords to workers, family, etc. then call them on the phone. You should also avoid saving passwords on your hard drive as that too is really easy to access.
  9. Make your security questions tough
    You know those security questions like “what is your mother’s maiden name?” Well, make them complex answers. For example, in one of mine I selected first pet’s name and then made the answer a complex password. If you ever get hacked you need this information to re-gain access to the account. You don’t want a hacker to change this.
  10. Back up everything
    You should constantly be backing up your hard drive, emails and blog contents to an external hard drive. If the worst happens and someone deletes your blog content you can get it back up without too much trouble. Imagine if you were relying on a website for your income and it all got deleted?
  11. Don’t use your PC Administrator account
    Most people use the Administrator account because it gives you freedom to add programs, etc. But, did you know that by using a non-Administrator account you can slow down the spread of a virus attack?
  12. Monitor your logged on locations
    If you go down to the bottom of your Gmail account you will see a little line of text that says “Last account activity”. This shows you where your account has been accessed from so if you suspect something is not right you should keep an eye on this and record unfamiliar IPs.
  13. Use a phishing filter
    This can help you identify if anyone is trying to run a phishing scam on you by showing you what is safe.
  14. Don’t click links in emails
    As a general rule, most banks and financial institutions don’t send you emails with links. Don’t ever click any such email you get. If you genuinely think it is from your bank ring them up instead.
  15. Research and read up
    Make sure you are up to date with the latest in internet security. You can create alerts in your news reader or follow blogs that update you on such concerns.
If I have missed anything out please leave a comment and let me know. Hopefully we can turn this article in to a nice resource for people to use in order to prevent these types of hacks and phishing scams happening to them.

What to do if you still get hacked

If you still get hacked there are some important steps that you should take from a business, personal and security point of view.
  • Don’t panic
    I panicked and it made everything so much worse. In the end it turned out to be okay. Even if the worse happens and you lose all your money (which is rare) you can still get back on your feet and fight another day. Most often the bank can investigate such losses and get your money back anyway.
  • Change everything else
    While you are investigating the breach go and change all your other passwordsincluding the security questions on all your other accounts. Make sure you are doing this from a safe PC and a secure network.
  • Email your contacts
    Email your contact list and let them know what has happened and that you are trying to fix it. Apologize for the inconvenience.
I sincerely hope that none of you have to ever go through this. While its not the worst thing that can go wrong, it sure isn’t fun.

Has this happened to you?

Is there anyone out there who has had something similar happen? What did you do?Please leave a comment and let me know if you have any other tips, ideas or stories that might help someone out there avoid the same fate.

10 Tips to Prevent Hackers


Hackers have been around for too long, usually associated with dark themes and “the evil side” they represent the minority of IT Gurus that just have too much time on their hands, and a touch of evilness.
Usually represented with a skull or “horrifically” they are iconic in a never ending battle against internet crime.
Your hosting provider should have set up your server with a certain amount of security built-in. However, there’s much you can do yourself to ensure your site stays unmolested.
Hackers play an “unwanted” yet a significant role on the net, it creates thousands if not millions of jobs, in the IT field but they are a menace to webmasters, such as you and me alike.
Not to worry, because the following list of “Ten Tips” aims to tell you a little about the way malicious hackers work, and some ways of protecting your site-and inevitably preserving the privacy of your visitors.

Ten Tips to Prevent Hackers

10) Comment Attacks

Comments are one of most prized features for blogs, and helps create a great relationship between the author and the reader, and also between readers in the wider community. It would also be easy for someone to insert HTML code that causes trouble.
You need to “validate” the form input before it’s accepted, to strip out all but the most basic HTML tags, for example and also if you’re using WordPress – you can utilize the “Keyword Filter” to block out any harsh words that might raise an issue or two.

9) Unsolicited Installation of Scripts

It can be dangerous to install third-party scripts and programs on your website unless you understand what they are actually doing. Even if you don’t fully understand the programming, you can read through the code and look for tell-tale signs such as references to third-party URLS.
You can also visit community forums such as SitePoint and DigitalPoint to ask around for better advice.

8) Avoid Scam/Spammy Websites

In a desperate attempt to get visitors you might consider try extensive viral marketing and other means of gaining the attention, this may cause a few people in the wrong community to raise a few eyebrows.
The last thing you need as a settled web-master is to cause a stir amongst the wrong people. Stay away from websites and especially forums that offer “information” or “get traffic quick” that uses illegal spam lists and such.

7) Clear the Cookies!

web_cookie2Personally, I use a lot of public computers to blog and do other online activities, maybe because it’s convenient or my unreliable ISP crashed on my once more. Inevitable there’s many, many webmasters like me that use public services for either a quick access or regular work.
Just don’t forget to clear out the cookies and cache before you leave! Even if the service provider claims “no tracking of privacy” or anything along those lines, a quick clean before you leave wouldn’t hurt anyone.

6) Prevent illegal farmers’ from “harvesting” your lists

Hacking techniques are used to “harvest” email addresses, which are then used by spammers and other hackers for malicious activities. If you are storing email data on your website, for what-ever required reason, make sure it’s stored in a secure format, such as a MySQL Database.
Most top-CMS such as WordPress and Joomla make this compulsory but there’s many self written CMS’s too. If your script simply writes data to a text called “emails.txt” it won’t be long before someone sniffs it out.

5) Make sure your files are using the correct CHMOD Permissions

chmodCHMOD File Permissions assign a specific value to every file/folder on your server, which allows different levels of access.
CHMOD Permission range from 000 (No access) to 777 (Full access), you must decide which files get what permissions, but be warned that some third party software require higher permissions to operate properly. You need to balance out features with security and make an informed decision.
Using a FTP you can change the permissions given to each file/folder on your server. This is vital to ensure any unauthorized access to your content is comprehensively denied.
Note – Make sure your CHMOD settings work with your current web-hosts. Some hosts prevent ’777′ for security reasons.

4) Don’t use Generic Usernames

Using common words for usernames such as “admin”, “administrator” or “Site Owner” can cause many implications because you are simply making the job of the hacker’s a lot easier. By using such common words for your username, you are incredibly increasing the success rate of the hacker by at least a few points of a percentage, which is consider a lot where only one answer can be right from an unlimited range of combinations.

3) Securing your Ports

To put in simple words, a “PORT” is used to access data from outside the server. It also utilized to transfer data both ways, into the server and also outgoing. Most of this activity is behind closed doors and happens automatically, and only trained professionals tend to play around with such details.
Nevertheless, ports are constantly opened & closed for easy-access, for programs such as a FTP (File Transfer Protocol). This can be favorable for any hackers attempting to access your sensitive files, so make sure any unwanted ports are ‘properly closed.’

2) Updated Security Patches

If your web hosting provider hasn’t already done so, you should check that all the latest security patches for various aspects of the service are properly installed. As you might know, WordPress (self-hosted) is one of the most popular Content Management Systems out there on the market.
It is used by millions- so it’s not surprising to see many hackers working day/night trying to hack it. Updates and patches are regularly released, so keep an eye out for all your plug-ins/core files.

1) Use Strong Passwords!

password_starThe number one technique you can possibly implement. Hackers are experts at programming computers to plough through huge amounts of data very quickly. That’s the reason longer passwords are more secure; the number of possible combinations grows exponentially with every extra character added.
Hackers employ a technique called “dictionary attack” where they repeatedly try username and password combinations by running through hundreds of common words, phrases, numbers and combination them till they get lucky. It’s important you use random strings like “j@m13s(!)” instead of perhaps “jamie123″
Lastly, this cannot be a ‘tip’ instead a complusory step in setting up your online community. Make sure your “.htaccess” and “.htpasswrd” is properly formatted with the secure CHMOD of 644. This is important and adds the best out-layer of protection for you and your visitors.