| 开发者 |
PMGLLC
peterdog |
|---|---|
| 更新时间 | 2014年12月9日 21:54 |
| 捐献地址: | 去捐款 |
| PHP版本: | 3.4.2 及以上 |
| WordPress版本: | 4.0.1 |
| 版权: | GPLv2 or later |
| 版权网址: | 版权信息 |
Step 1: breathe Step 2: login to FTP or hosting and rename the stealth-login-page folder in /wp-content/plugins Step 3: login If those steps don't work, then it's possible you have a server caching or a caching plugin or a CDN that is still delivering the plugin files. Clear all caches (not your browser cache).
Ensure that you clicked the Save Settings button after the box was checked. In every case I've seen, clicking it a second time always sends it.
Version 3.0.0 and greater is fully network-activated, includes uninstall, and bypasses all the settings pages with wp-config.php variables. See the Intallation tab or above in this file for instructions.
We've realized that bots (or really bored people) can enter a URL string in the address bar that attempts to log in without ever showing the login form. If the guess is unsuccessful, then they are redirected just the same and their IP address is logged by the other plugins. This reinforces the need for a 3-prong approach: strong credentials, login limiter plugin, and a stealthy login page.
Yes, as long as you are not actively logged into the site on that computer. You may enter your dashboard normally if you're in an active session. Once the session expires, you're further protected by it automatically redirecting rather than gaining access to the login form since WordPress redirects session timeouts to wp-login.php, unaware of the new URL string.
You'll need FTP access to your site. Renaming the stealth-login-page folder in /wp-content/plugins/ will remove the stealth security and allow you back into your dashboard. If you have used variables in the wp-config.php file, delete or comment out those lines.