[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@18.227.21.101: ~ $
���4�L8K�K$�K
�K�KLLL#L+L@4L
uL�L	�L4�LJ�LM7MSM
hM	vM�M!�M�M�M�M�M�M�M
N
N0$N&UN|N�N�N�N�N�N�N"O�#O��OhdPI�PTQClQ��Q�=Rl�RT9S�S!�S�S �S$
T/T?TZT
pT~T!�T�T�T��T��UhVoVxVD�V!�V�VWWP"WsW|W�W��W[/Xd�XL�X_=Y2�Y�Y+�YZZ�Zb�Z ;[\['d[$�[$�[�[m�[SW\T�\�]O�]2�]$^#-^Q^^^!s^(�^&�^�^�^_ "_C_?V_k�_``^`�t`MAa�aA�a�a��a��b
cH#clc~�cddK#dodd�dm�d�d:
eHe!ae�e�e�e��ebfuf�f�f�f�f�f3�f-gMg%mg�g �g.�g#�gh2hJh&fh�h�hS�hi$i'9i"aic�i	�i.�i	!j;+j*gj�j
�j��j`k#~k�k�k	�k
�k�k�kGl�Sl�l�l[m(jm�m&�m(�m,�m&n?n^n)yn�n�n�n��n�o�o�o�op-pJp�[pEqdq}q	�q�q�q	�q"�qP�q9r!Ergror�r�r�r�rP�r,s	AsKsWs_s}s�s�s�s�s!�st,t5t=t<Wt�t�t�t#�t�t�t�t`u�ou\v�iv|w�w�w^�w
yy&y3?ysyo�y"�yz0zKz^zwzI~z�z�z�z{"{>{ X{Uy{!�{�{%�{A#|e|�|�|�| �|��|W}�p}! ~mB~
�~+�~+�~)@[y$��	�
��[�g:�����܀��$�;�T�\�x����.�C�Z�s�|�2�����˂��˃Ӄ��
�4)��^�b�L�]��p��	>�jH�,��e��F�������j�m���	����Ŏ͎5ގ6�FK�
�����������r��� �Y̑B&��i�d2�c��@��k<����5C�y���S��u��
u���������Ė�����	0�
:�-E�s���-��ԗ�'�-�@�Q�h�+y���G��I�eR�<��
���
�(�!G�i�
x�������!�ț
؛"�	���-� �<�
E�P�a�h�y���L������	���)���ȟԟݟ����
(�6�J�i�U��ߠ.�"�B�#\���	��,��jʡ5�%U�{�5��!��'���4�N�S�s����C�H�
[�i�C���ĤF��J������7��R��d��^�$c�����§���	�	�'�7�J�Z]�6��1�H!�]j�8ȩt�Mv�IĪ��[���3�/B�Gr�N��(	�:2�om��ݭK_�~��I*�-t�"��ů�Z��Y�
i�t�J��ΰݰ��
��0�A�~Q�5б���7� Ͳ2��!�-�m4����5>�t�2��
��ǵӵ5ܵ	�<�Y��o���8
�F��a� ����$�%+�Q�j�z�[���j�)U������	��b��(�#F�$j�!��������¼Ҽ2�" �C�_�"|�����$˽`� Q�r���=��bϾ2�;�L�!b�d��T�G>�����0���+�0	�8:�s�#|�(��)��)���;�Y�^�y������n�u�P�� ����%�#D�$h�����+��!��#�9�
A�YO�	������ ������:��M�{���N�z�L��8��g�6t�������U����F��5��o�eu�P��F,�Gs�D��>�??�%�y��F�'f�-��+��1�������H8�;��H����%��+�����
����I�����|��p�� o�@��#�����Z��R��N<�6�������x�����9�a���T�;�������z��Y�Vi�:��x��Tt���L���-�q���������(o�N��?��R'�Dz�l��,����	��	��G��s��7U���O��y��o�'������.�� ��b�]��Y��:��Y�P�l�q�5��-��z��l���d����w,�B����g�	l�v���'����T��!�7�J�W�i�n�}�����5�������-�E�\�"o��������G�OP�T��/��3%��Y��!4�V�k�����<��P�i=����������)�6��|/�����|�3$�WX�&��g��?������^b�G��I	GSM�H�2�R �F?Ld���Q}\�:,�gl�@[&�#�=�#%>I5�C�(+#K2o��#V0z���k	2$
;W
[�
`�
xP[�j%9������2�
(
<
	N
!X
z
�
�
�
�
�
�
�

n.��$M
r}�����@�
	4JT�7��
�	!%G^rx�
��0�&�2MZmv"����fh�IYT�C��<��lXT�!7Y u$����
�
!@]�y�E��D"Vy��P�	�9[�dL}_�2*]+a����be ��'�$ $> c mv S� T8!��!O"2b"$�"#�"�"�"!#("#&K#r#�#�# �#�#?�#k#$�$�$^�$�%M�%&A8&z&��&�'
�'H�'�'~(�(�(K�(�(
))m)�):�)�)!�)*0*G*�f*�*+++6+R+k+3�+�+�+%�+!, 2,.S,#�,�,�,�,&�,-7-SL-�-�-'�-"�-c.	v..�.	�.;�.*�. /
;/�I/�/#000H0	h0
r0}0�0G�0��0z1�1[�1(�1!2&72(^2,�2�2�2�2)313P3V3�^3S4g4p4�4�4�4�4��4E�5�56	6&6D6	I6"S6Pv6�6!�6�6�6727C7T7Pi7�7	�7�7�7�78 868F8d8!8�8�8�8�8<�8"9)999#J9n9w9�9`�9��9�:��:|�;<<^/<
�=�=�=3�=>o>"�>�>�>�>�>?I?V?t?�?�?�?�? �?U@!]@@%�@A�@�@AA0A =A�^A�A��A!�Bm�B
>C+LC+xC)�C�C�CD$D?D	ED
ODZD[lDg�D0EOEjE�E$�E�E�E�EF�F.�F�F�FG
G2GLG�YGAHYHaHrH�H
�H4�H��HbwI�I�I��I�J	�Jj�J,AKenN��P��Q�GR�R�RS	5S?SSS[S5lS6�SF�S
 T+T�8TU'Ur;U��UYZVB�V��Vd�Wc%X@�Xk�X�6Y5�YZZS9Zu�Z
[[![4[<[R[n[�[�[�[	�[
�[-�[\\-4\b\o\'x\-�\�\�\�\+]3]GN]I�]e�]<F^
�^�^
�^�^!�^�^
__�#_��_V`
f`"t`�`�`��` �a�a
�a�a�a�abbM2b�b�b�b	�b�b��b��cWdcdldxdd�d�d
�d�d�d�dUene.�e�e�e#�ef	"f,,fjYf�f%�f
g5g!Pg'rg�g�g�g�g�gh�h�h�h
�h�hCi�Si�i��iwj�j�j�j�j��jkd�k�k$�kl3lQlol~l�l	�l	�l�l�l�lZ�l6Gm1~mH�m]�m8Wnt�nMoISo��o[$p�p3�p/�pGqNIq(�q:�qo�q�lrK�r~:sI�s-t"1tTtttZ�t�t
�tuJu]ulu�u�u�u�u�u~�u5_v�v�v��v \w2}w��w-�xm�x�1y&�y�y#�y
z)z5z5>z	tz<~z�z��z]{8o{�{��{ M}�n}P~$h~%�~�~�~�~[�~DjL)����	�b�(�#��$̀!����$�4�2O�"������"ށ��$-�`R� ��Ԃ�=�b1�������!ăd�TK�G�����0	�:�+?�0k�8��Ն#ކ(�)+�)U��������ۇ�����Ј׈P�� H�i�����#��$ʉ�
�+)�!U�#w���
��Y��	��%� :�[�p��������{6����zo�L�87�gp�6؎�������\�F�53�oi�eّP?�F��GגD�>d�?��%�y	�F��'ʔ-�+ �1L��~��
�H��;�H!��j�%	�+/�[��q��*�I
��T�|�pb� ӛ@�#5��Y�Z�RM�N��6�&��@�ܞ������aV����;E�����@�z��Ys�Vͣ:$�x_�Tؤ-�LD����q�����w��B�(ӨN��?K�R��Dޫl#�����	�	�G��sE�7���O	�yY�ӯ'���.3� b�b��]�YD������P�вղ5�-'�zU�г�d�k�s�w��B�K�˵	еڵ��'�*�T0���������ͶҶ��	�5�O�_�x�������"ӷ�������O��T�/Y�3�����|�!����ϻ���<�PP�i�������)2�6\�|������3��W��&�g;���������^��G%�Im�G��M��HM������ H�Gi�?��d���V�Q��\4�:�����lS�@��&�#(�=L�#��>��5��C#�(g���#��2����#��0�������2��;��[��`T�x��[.�j��9��/�8�A�E�J�2Q�������	��!��������)�5�=�R�e�r�~�n�#�^g����c^��"B!�&p��Tg�Sb�mOP4�x�n����_>5S�5���Et9�C���Z�*��Q���@#}�vf�vG0�0?��jj����3�.j���)��t����\��o���'��!s/
L�^|<��C�0�6!�~4�u�@�$5{��/p����Zr1|�T�C�]�K����:B�x�Q1���'Y� ��(KG�(�[���L�?l���P
�+x�e���:�x�����(1EqQ��wM��vI<���U2�#�1�����3m��a7$���d���D��_�������_��t�}�b��4Q�
�"�7*�Y�GC3�����w{z\k:�g`7U
VFB�O�&���A�a;��
A�I2����;'W�_c/�A��=���<>YJ,J��z��pe���G�b�X�z*;�kqLL[��\��a�U6��:]�e�w�>8pl��S�8T��MmNMH].����}fI,^`��wW2�h��X{;�y�b�[J�E~���%6]~�or��"��-�-y���c�"��+����i���E���*�#�� 8&��o����u��f(V�NFB�K�Pn�HI����!dD�+���-��ZDVth>���\��D��k��.=��P������~cR=��y)��lv���@qd9�Jg�m�r%}�/��`&��%
h
�o{k8����)�sh�,��i��la����
?����O��UzR�jds�7e���=�iWn	����,?-��SrX��TAR��.����N5�9u�YR0�y+VH���FK9���X����i� ��'$����� 	%���u�M@��3�$�6[	��f�OW4|�|�	s�`H���N�Fq<����)��Z�2�� Please note that you can always save and finish the wizard later, use our %sdocumentation%s for additional information or log a %ssupport ticket%s if you need our assistance.%1$s &lsaquo; %2$s &#8212; WordPress%d seconds%d:%02d minutes%d:%02d:%02d hours%s day%s days%s hour%s hours%s is a singleton class and you cannot create a second instance.%s minutes%s month%s months%s unused code remaining.%s unused codes remaining.%s vulnerability has been detected.%s vulnerabilities have been detected.%s week%s: %s vulnerability found%s: %s vulnerabilities found(opens in a new tab)(recommended)(unknown).htaccess does not exist.htaccess in uploads not writable.htaccess not writable.htaccess redirect.1 day1 hour1 year2 years30 minutes301 .htaccess redirect301 .htaccess redirect (read instructions first)301 .htaccess redirect is not enabled.301 PHP redirect301 SSL redirect enabled301 redirect to https set.404 Blocking48 hours (default)6 months8 hours (recommended)A %s vulnerability is found in %s.A correctly configured Content Security Policy can protect your visitors from the most common web attacks. It all starts with denying and upgrading insecure requests on your website.A debug.log is publicly accessibile and has a standard location. This will change the location to a randomly named folder in /wp-content/A definition of a site url or home url was detected in your wp-config.php, but the file is not writable.A firewall rule was enabled, but /the wp-content/ folder is not writable.A firewall rule was enabled, but the firewall does not seem to get loaded correctly.A firewall rule was enabled, but the wp-config.php is not writable.A lockout will occur if an IP address exceeds the threshold within the given timeframe. Select ‘%s’ if you want to disable 404 blocking.A networkwide SSL activation process has been started, but has not been completed. Please go to the SSL settings page to complete the process.A verification code has been sent to the email address associated with your account to verify functionality.A verification code has been sent to the email address associated with your account.API login for user disabled.Able to create destination folderAbout Cross Origin PoliciesAbout Essential Security HeadersAbout HTTP Strict Transport SecurityAbout HardeningAbout Limit Login AttemptsAbout VulnerabilitiesAbout XML-RPCAbout notificationsAbout the Content Security PolicyAbout the Mixed Content ScanAbout the Permission PolicyAccording to our information, your hosting provider does not allow any kind of SSL installation, other then their own paid certificate. For an alternative hosting provider with SSL, see this %sarticle%s.According to our information, your hosting provider supplies your account with an SSL certificate by default. Please contact your %shosting support%s if this is not the case.ActionActivateActivate SSLActivate SSL per site or install a wildcard certificate to fix this.Activate networkwide to fix this.Activate your license keyActivating plugin...ActiveAdd additional domains which can embed your website, if needed. Comma seperated.AdvancedAdvanced HardeningAdvanced WordPress HardeningAdvanced hardening features complement the basic hardening functions by protecting your site against advanced threats and attacks.Advanced hardening features to protect your site against sophisticated threats and attacks.After completing the installation, you can continue to the next step to complete your configuration.After enabling this feature, you can submit your site to %shstspreload.org%sAfter this number of failed login attempts the user and IP address will be temporarily blocked.Alias domain check is not relevant for a subdomainAllAll recommended hardening features enabled.AllowAllow grace periodAllow only necessary third party resources to be loaded on your website, thus preventing common attacks. Use our unique learning mode to automatically configure your Content Security Policy.Allow visitors that might accidentally exceed the threshold to unblock themselves using a Captcha.Allow your domain to be embeddedAllowedAllows you to enter a custom login URL.An SSL certificate has been detectedAn error occurred, please try again.An error occurred:An option that requires the .htaccess file in the uploads directory is enabled, but the file is not writable.An option that requires the .htaccess file is enabled, but the file does not exist.An option that requires the .htaccess file is enabled, but the file is not writable.As a security precaution, the username ‘admin’ has been changed on %s. From now on, you can login with '%s' or an email address.As your order will be regenerated, you'll need to update your DNS text records.Attempting to install certificate using AutoSSL...Attempting to install certificate...Attempting to set DNS txt record...AuthenticateAuthentication Code:Authentication code is incorrect.Authentication codes will be sent to %s.Authentication provider not specified.Authenticator AppAuthenticator App (TOTP)Authenticator appAuthorization not completed yet.Automated MeasuresAutomatic certificate detection is not possible on your server.Automatic renewal of your certificate was not possible. The SSL certificate should be %srenewed%s manually.Backup CodesBasicBecause the $_SERVER["HTTPS"] variable is not set, your website may experience redirect loops.Below you will find the instructions for different hosting environments and configurations. If you start the process with the necessary instructions and credentials the next steps will be done in no time.Below you will find your login code for %1$s. It's valid for 15 minutes. %2$sBlock the username 'admin'Block user registrations when login and display name are the sameBlockedBlocked IP addresses will be automatically unblocked after the above-configured interval. In the table below you can instantly unblock IP addresses.Blocked usernames will be automatically unblocked after the above-configured interval. In the table below you can instantly unblock usernames.BlocklistsBrowser features are plentiful, but most are not needed on your website.Bundle not available yet...By default, WordPress shows if a username or email address exists when a login fails. This will change it to generic feedback.CPanel hostCPanel passwordCPanel recognized. Possibly the certificate can be installed automatically.CPanel usernameCancelCaptchaCaptcha has not yet been verified, you need to complete the process of a Captcha to verify it's availability.Captcha providerCertificate already generated. It was renewed if required.Certificate not created.Challenge directory not writable.Change debug.log file locationChange passwords everyChanged debug.log location to:Changing redirect methods should be done with caution. Please make sure you have read our instructions beforehand at the right-hand side.Cheatin&#8217; uh?Check againCheck manuallyCheck your %slicense%s.Checking SSL certificate...Checking alias domain...Checking certs directory...Checking challenge directory reachable over http...Checking challenge directory...Checking for subdomain setup...Checking for website configuration...Checking host...Checking if CURL is available...Checking if Terms & Conditions are accepted...Checking if plugin folder exists...Checking key directory...Checking permissions...Checking server software...Choose new username to replace 'admin'Choose the max-age for HSTSChoose your providerClick the button below to confirm your email address, or copy the following URL: %sCloudWays API keyCloudWays user emailCode was was invalid, try "Resend Code"Codes only available for 5 minutesComplete email validation and enable notifications to make sure you will receive security warnings.CompletedComplianz - Consent Management as it should beComponentComponents will be quarantined if the update process fails.Compromised password for %s has been resetCompromised password resetConfigurationConfigure your Cookie Notice, Consent Management and Cookie Policy with our Wizard and Cookie Scan. Supports GDPR, DSGVO, TTDSG, LGPD, POPIA, RGPD, CCPA and PIPEDA.Configured for HTTP challengeConsent Management as it should be.Content Security PolicyContent Security Policy HeadersContinentContinentsContinueContinue to renew.Control and monitor the use of XML-RPC on your site with learning mode.Control browser features that could allow third parties to misuse data collected by microphone, camera, GEO Location etc, when enabled for your website.Copy setup keyCopyright warning!Could not automatically add TXT record. Please proceed manually, following the steps below.Could not copy code execution test file.Could not copy text: Could not create test folder and file.Could not find code execution test file.Could not reach challenge directory over %s.Could not rename folder!Could not retrieve server listCould not test certificateCould not verify TXT record for domain %sCould not verify alias domain.CountCountryCrawlers might scan your site looking for possible exploits. One way to detect this is the fact that they trigger more 404 (not found) errors than legitimate visitors would. Below you can set the threshold and lockout duration for 404 blocking.Creating account...CriticalCritical (default)Cross Origin Embedder PolicyCross Origin Opener PolicyCross Origin Resource PolicyCustom login URLCustomize login attempts, intervals, and temporary lockouts according to your preferences to regulate the level of security on your website during authentication. No additional settings requiredDNS records were not verified yet. Please complete the previous step.DNS token not retrieved.DNS verificationDashboardDashboard - Test NotificationDateDebug.logDelete all data on plugin deletionDepending on your hosting provider, %1$smanual installation%2$s may be required.DescriptionDestination folder already existsDetailsDetected File ChangesDetected status of your setup.Direct Admin URLDirectAdmin hostDirectAdmin passwordDirectAdmin recognized. Possibly the certificate can be installed automatically.DirectAdmin usernameDirectiveDirectoriesDisableDisable "anyone can register"Disable HTTP methodsDisable OCSP staplingDisable XML-RPCDisable application passwordsDisable directory browsingDisable the built-in file editorsDisable user enumerationDisabledDismissDismiss all notificationsDo you want to store these credentials for renewal purposes?DomainDon't ask againDon't show againDon't use Two-Factor AuthenticationDownloadDownload Backup CodesDownload CodesDue to a change in challenge type, the order had to be reset. Please start at the previous step.During the grace period users can configure their Two-Factor method. When the grace period ends, users for which 2FA is enforced won’t be able to login unless 2FA is correctly configured. The grace period is also applied to new users.E-mail loginEasily improve site security with WordPress Hardening, Two-Factor Authentication (2FA), Login Protection, Vulnerability Detection and SSL certificate generation.Elevate your security with our Premium Support! Our expert team ensures simple, hassle-free assistance whenever you need it.EmailEmail VerificationEmail Verification sends a verification code to the user’s email address. This method provides protection against leaked or weak passwords, though it is less secure than other 2FA methods. If a user’s email inbox is compromised, one could still get access to the user account. It is not recommended to allow Email Verification for administrators.Email addressEmail address not validEmail could not be sent.Email could not be sent. No message or subject set.Email notification errorEmail notifications are only sent for important updates, security notices or when certain features are enabled.Email sent! Please check your mailEmail validationEmail validation completedEmail verificationEmail verification errorEnableEnable .htaccess only if you know how to regain access in case of issues.Enable 301 .htaccess redirectEnable 301 redirectEnable Custom login URLEnable FirewallEnable Limit Login AttemptsEnable Permissions PolicyEnable Two-Factor AuthenticationEnable a .htaccess redirect or PHP redirect in the settings to create a 301 redirect.Enable compromised password checkEnable for:Enable open source blocklist API etc.Enable the Vulnerability scan to detect possible vulnerabilities.Enable vulnerability scanningEnabledEnabling auto renew...Enforce for:Enforce frequent password changeEnforce secure password policies for your users by requiring strong passwords, and expiring passwords after a period of your choosing.Enforce strong passwordsEnforcing 2FA ensures that all users with the selected roles must login using Two-Factor Authentication. It is strongly recommended to at least enforce 2FA for Administrators.Enter a backup verification code.Enter a custom login URL. This allows you to log in via this custom URL instead of /wp-admin or /wp-login.phpError code %sError enabling auto renew for Let's EncryptError occurred when retrieving the webpage.Errors were reported during installation.Essential Security HeadersEssential WordPress hardeningEssential securityEssential security headers installedEventEvent LogEvent LogsEvery three hoursExample: If you want to change your login page from /wp-admin/ to /control/ answer: controlExperience all powerful features of Really Simple Security Pro using this %slimited time discount%s: %sFailed retrieving access tokenFailed retrieving account.Failed to activate pluginFailed to create a login nonce.Failed to gather package informationFailed to install pluginFeatureFeedback in plugin overviewFile Change DetectionFile Change Detection generates a snapshot of every .php and .js file. On a daily basis, each file is then compared to this snapshot.File missing. Please retry the previous steps.File permissions checkFiles not created yet...FirewallFirewall RulesFor more information, please read this %sarticle%sForce updateFrom now on, the debug.log won’t be publicly accessible whenever wp-debugging is enabled. The debug log will be stored in a randomly named folder in /wp-content/. This prevents possible leakage of sensitive debugging information.GDPR/CCPA Privacy SuiteGeneralGeneral SettingsGenerate Verification CodesGenerating SSL certificate...GenerationGet Login Protection with Really Simple Security ProGet detailed insights into visitors' behaviour with Burst Statistics, the privacy-friendly analytics dashboard from Really Simple Plugins.Get notified of important changes, updates and settings. Recommended when using security features.Go to activationGo to installationHSTS forces browsers always to load a website via HTTPS. It prevents unnecessary redirects and prevents manipulation of data originating from communication with your website.HTTP Strict Transport SecurityHardeningHardening features limit the possibility of potential weaknesses and vulnerabilities which can be misused.Hello %1$s, an unusually high number of failed login attempts have been detected on your account at %2$s.

These attempts successfully entered your password, and were only blocked because they failed to enter your second authentication factor. Despite not being able to access your account, this behavior indicates that the attackers have compromised your password. The most common reasons for this are that your password was easy to guess, or was reused on another site which has been compromised.

To protect your account, your password has been reset, and you will need to create a new one. For advice on setting a strong password, please read %3$s

To pick a new password, please visit %4$s

This is an automated notification. If you would like to speak to a site administrator, please contact them directly.Hello, this is a notice from your website to inform you that an unusually high number of failed login attempts have been detected on the %1$s account (ID %2$d). Those attempts successfully entered the user's password, and were only blocked because they entered invalid second authentication factors. To protect their account, the password has automatically been reset, and they have been notified that they will need to create a new one. If you do not wish to receive these notifications, you can disable them with the `two_factor_notify_admin_user_password_reset` filter. See %3$s for more information. Thank youHere you can configure vulnerability detection, notifications and measures. To learn more about the features displayed, please use the instructions linked in the top-right corner.Here you can see which users have configured Two-Factor Authentication. The reset button will trigger the 2FA onboarding for the selected user(s) again and allow the configured grace period.Here you control the users that are automatically, and temporarily blocked. You can also add or remove users manually. We recommend blocking ‘admin’ as username as a start.HiHide the remember me checkboxHide your WordPress versionHigh-riskHigh-risk (default)HostingHosting providerI agree to the Terms & Conditions from Let's Encrypt.I don't know, or not listed, proceed with installationI have read and understood the risks to intervene with these measures.IP AddressIP AddressesIP Addresses can be allowed, blocked or will show up when your settings add them to a temporary blocklist. If you want to add your IP to the allowlist, please read the article provided at the right-hand side for instructions.IP BlocklistIP address overviewIf the number of failed login attempts is exceeded within this timeframe, the IP address and user will be blocked.If the username 'admin' currently exists, you can rename it here. Please note that you can no longer use this username, and should use the new username or an email addressIf there's a vulnerability, you will also get feedback on the themes and plugin overview.If this is not the case, don't add this alias to your certificate.If this option is set to true, the mixed content fixer will fire on the init hook instead of the template_redirect hook. Only use this option when you experience problems with the mixed content fixer.If unexpected file changes have occurred, this could be an indication that your site is compromised.If you are the owner of this account, please check your email for instructions on regaining access.If you entered your DNS records before, they need to be changed.If you recognize the detected changes, you can add the files to the exclude list, or ignore them just once.If your site is only intended for users to login from specific geographical regions, you can entirely prevent logins from certain continents or countries.Implement Two-Factor Authentication or Passkey login.Import and insert fileImprove security - UpgradeImprove security by requiring strong passwords and forced periodic password changesImprove the default WordPress password strength check. You can also enforce frequent password changes for user roles.Include aliasInclude preloadInclude subdomainsInstallInstall %sManually%s.Install Authentication app:Install SSL certificateInstallationInstallation failed.Installation finishedInstalledInstallingInstalling SSL certificate using PLESK API...Installing SSL certificate...Installing plugin...Instantly configure these essential features.InstructionsIntervalInvalid Two Factor Authentication code.Invalid Two Factor Authentication secret key.Invalid license.Invalid login details.Invalid providerInvalid two-factor authentication provider.Invalid verification code.It is not possible to install Let's Encrypt on a localhost environment.It is not possible to install Let's Encrypt on a subfolder configuration.It is not possible to install Let's Encrypt on a subsite. Please go to the main site of your website.Keep your site secure by monitoring unexpected file changes.Key copiedLax - 10 errors in 2 secondsLearn moreLearn more about our features!Learn more about security headersLeave a reviewLet's EncryptLet's Encrypt.Letʼs Encrypt is a free, automated and open certificate authority brought to you by the nonprofit Internet Security Research Group (ISRG).Leveraging your SSL certificate with HSTS is a staple for every website. Force your website over SSL, mitigating risks of malicious counterfeit websites in your name.License invalidLicense validLightweight SSL & Hardening PluginLimit AttemptsLimit Login AttemptsLimit Login Attempts protects your site from login attempts by unauthorized users. When you enable Limit Login Attempts, all login attempts are logged and repeated attempts to login with invalid credentials will be blocked automatically.Limit logged in session durationLocationLocked-outLockout durationLog InLogin ProtectionLogin attemptsLogin credentials incorrectLogin credentials incorrect. Please check your login credentials for cPanel.Login statusLogsLow-riskLow-risk Low-risk (default)Maintain peace of mind with our simple, but effective automated measures when vulnerabilities are discovered. When needed Really Simple Security will force update or quarantaine vulnerable components, on your terms!Many vulnerabilities are exploited by injecting a user with administrator capabilities outside of the native WordPress creation process. Under advanced hardening you can prevent this from happening.Maybe laterMeasuresMedium-riskMethodMissing license.Mixed Content FixerMixed Content ScanMixed contentMixed content fixerMixed content fixer - back-endMixed content fixer - init hookMixed content fixer not enabled. Enable the option to fix mixed content on your site.Mixed content in %sMixed content in CSS/JS file from other domainMixed content in PHP file in %sMixed content in post: %sMixed content in the postmeta tableMixed content scanMore infoMultiple %s vulnerabilities have been found.No 301 redirect is set. Enable the WordPress 301 redirect in the settings to get a 301 permanent redirect.No 301 redirect to SSL enabled.No SSL certificate has been detected.No SSL detectedNo SSL detected. Use the retry button to check again.No known vulnerabilities detectedNo recommended redirect rules detected.No redirectNo subdomain setup detected.No valid list of domains.NoneNormal - 10 errors in 5 secondsNot recognized server.Not sure if you're using XML-RPC, or want to restrict unauthorized use of XML-RPC? With learning mode you can see exactly which sources use XML-RPC, and you can revoke where necessary.NoteNotification by %sNotificationsNotifications by emailOCSP not supported, the certificate will be generated without OCSP.OCSP stapling is configured as enabled by default. You can disable this option if this is not supported by your hosting provider.OffOn Apache you can use a .htaccess redirect, which is usually faster, but may cause issues on some configurations. Read the instructions in the sidebar first.Once every 5 minutesOnce every dayOnce every weekOne click SSL optimizationOne day (for testing only)One of the most powerful features, and therefore the most complex are the Cross-Origin headers that can isolate your website so any data leaks are minimized.One yearOnly enable this if you experience mixed content in the admin environment of your WordPress website.OpenOrder ID mismatch, regenerate order.Order successfully created.Order successfully retrieved.Package information retrievedPassword ResetPassword SecurityPassword securityPasswordsPermanentPermanent blockPermission denied.Permissions PolicyPlease %sconsider upgrading to Pro%s to enjoy all simple and performant security features.Please activate it manually on your hosting dashboard.Please activate it on your dashboard %smanually%sPlease add the following lines to your .htaccess, or set it to writable:Please adjust the CAA records via your DNS provider to allow Let’s Encrypt SSL certificatesPlease change your email address %shere%s and try again.Please check if the advanced-headers.php file is included in the wp-config.php, and exists in the wp-content folder.Please check if the non www version of your site also points to this website.Please check if the www version of your site also points to this website.Please check if your REST API is loading correctly. Your site currently is using the slower Ajax fallback method to load the settings.Please check the vulnerabilities overview for more information and take appropriate action.Please complete %smanually%sPlease complete manually in your hosting dashboard.Please complete the following step(s) first: %sPlease configure your %sCaptcha settings%s before enabling this settingPlease create a folder 'rsssl' in the uploads directory, with 644 permissions.Please double check your DNS txt record.Please enter the code generated by your authenticator app.Please make sure to configure a method, access to your account will be denied if no method is configured today.Please make sure to configure a method, access to your account will be denied if no method is configured within the next %s days.Please refresh the SSL status if a certificate has been installed recently.Please scan the QR code or manually enter the key, then enter an authentication code from your app in order to complete setup.Please set the wp-config.php to writable until the rule has been written.Please set the wp-content folder to writable:Please start at the previous step.Please take appropriate action.Please verify your emailPlease wait %s before trying again, as this is the expiration of the DNS record currently.Plesk admin URLPlesk hostPlesk passwordPlesk recognized. Possibly the certificate can be installed automatically.Plesk usernamePlesk username and passwordPlugin activatedPlugin installedPowered by WordPressPreferred MethodPremium SupportPrevent clickjacking and other malicious attacks by restricting sources that are permitted to embed content from your website.Prevent code execution in the public 'Uploads' folderPrevent login feedbackPrevent session hijackingPrevent usage of passwords that have been included in a databreach. This securely verifies part of the hashed password via the Have I Been Pwned API.Privacy-friendly analytics tool.Protect your login form with Limit Login Attempts.Protect your site against brute force login attacks by limiting the number of login attempts. Enabling this feature will temporary lock-out a username and the IP address that tries to login, after the set number of false logins.Protect your site with a performant Firewall.Protect your website against brute-force attacks with a captcha. Choose between Google reCAPTCHA or hCaptcha.Protecting your website visitors from malicious attacks and data breaches should be your #1 priority, start with the essentials with Really Simple SecurityProvider LabelBackup Verification Codes (Single Use)Provider LabelEmailProvider LabelTime Based One-Time Password (TOTP)QuarantineQuarantinedRe-checkRead about our journey towards Really Simple SecurityRead moreRead more about security concerns with debug display enabledReally Simple PluginsReally Simple Plugins is also the author of the below privacy-focused plugins, including consent management, legal documents and analytics!Really Simple SSLReally Simple SSL is now %1$sReally Simple Security!%2$sReally Simple Security ProReally Simple Security allows you to limit the default logged in session duration. By default, WordPress will keep users logged in for 48 hours, or even 14 days when clicking the ‘remember me’ checkbox. An attacker could possibly steal the logged in cookie and gain access to a user’s account. Limiting the logged in duration to 8 hours will greatly reduce the risk of session hijacking.Really Simple Security dashboardReally Simple Security will send email notifications and security warnings from your server. We will send a test email to confirm that email is correctly configured on your site. Look for the confirmation button in the email.Receive a code by emailRecommended by Really Simple PluginsRecommended security headers enabled.Recovery Mode &#8212; %sRedirect methodRedirectionRedirects your site to https with a SEO friendly 301 redirect if it is requested over http.RegionsRename admin user enabled: Please choose a new username of at least 3 characters, which is not in use yet.Rename and randomize your database prefixRenew certificateRenew installationResend CodeReset KeyRestrict access from specific countries or continents. You can also allow only specific countries.Restrict creation of administrator rolesRetrieving Cloudways server data...Retrieving DNS verification token...Retrieving package information...RetryRiskRulesSSL Status TestSSL activation in progressSSL certificate should be generated and installed.SSL certificate will expire on %s.SSL is enabled networkwide.SSL is enabled on your site.SSL is not enabled on your networkSSL is not enabled yet.SSL is not enabled.SSL is not yet enabled on this site.SSL is now activated. Follow the three steps in this article to check if your website is secure.SSL successfully installed on %sSave and continueScan resultsSearching for link to SSL installation page on your server...Secret key is configured and registered. It is not possible to view it again for security reasons.SecuritySecurity HeadersSecurity Headers TestSecurity configuration completed!Security configuration not completed yet. You still have %s task open.You still have %s tasks open.Security through obscurity. Your site is no longer using the default wp_ prefix for database tables. The process has been designed to only complete and replace the tables after all wp_ tables are successfully renamed. In the unlikely event that this does lead to database issues on your site, please navigate to our troubleshooting article.See which recommended security headers are not present on your website.Selected providerSelf (Default)Self-hosted and privacy-friendly analytics tool.SendServe encrypted and authenticated responsesSet permissions to 644 to enable SSL generation.Set your wp-config.php to writable and reload this page.SettingsSettings update: .htaccess redirectSettings update: Database prefix changedSettings update: Debug.log file relocatedSettings update: Username 'admin' renamedSite wide - Test NotificationSite-wide, admin notificationSkipSkip (%1$d %2$s remaining)Skip (Only today remaining)SourceStart login protection by adding an additional layer during authentication. This will leave authentication less dependent on just a single password. Want to force strong passwords? Check out Password Security.StatusStop editing the .htaccess fileStore for renewal purposes. If not stored, renewal may need to be done manually.Strict - 10 errors in 10 secondsStrong Password policySubmitSuccessfully added TXT record.Successfully generated certificate.Successfully installed Let's EncryptSuccessfully installed SSLSuccessfully retrieved accountSuccessfully retrieved server id and app idSuccessfully verified DNS recordsSuccessfully verified alias domain.SupportSystem statusTOTP requires users to authenticate using a third-party app such as Google Authenticator.TemporaryTemporary blockTerms & ConditionsTerms & Conditions are accepted.Terms and ConditionsTest not found.Test notification email errorTest notificationsTest notifications can be used to test email delivery and shows how vulnerabilities will be reported on your WordPress installation.The 'force-deactivate.php' file has to be renamed to .txt. Otherwise your ssl can be deactivated by anyone on the internet.The .htaccess redirect has been enabled on your site. If the server configuration is non-standard, this might cause issues. Please check if all pages on your site are functioning properly.The .htaccess redirect rules selected by this plugin failed in the test. Set manually or dismiss to leave on PHP redirect.The 301 .htaccess redirect is the fastest and most reliable redirect option.The 301 redirect with .htaccess to HTTPS is now enabled.The DISALLOW_FILE_EDIT constant is defined and set to false. You can remove it from your wp-config.php.The DNS response for %s was %s, while it should be %s.The EssentialsThe Event Log shows all relevant events related to limit login attempts. You can filter the log using the dropdown on the top-right to only show warnings.The Event Log shows all relevant events related to the Firewall and IP lockouts. You can filter the log using the dropdown on the top-right to only show warnings.The Hosting Panel software was not recognized. Depending on your hosting provider, the generated certificate may need to be installed manually.The IP address will see a locked out screen for the selected duration.The PHP function CURL has successfully been detected.The PHP function CURL is not available on your server, which is required. Please contact your hosting provider.The SSL certificate has been renewed, and requires manual %sinstallation%s in your hosting dashboard.The Terms & Conditions were not accepted. Please accept in the general settings.The Two-Factor Authentication setup for TOTP failed. Please try again.The Two-Factor Authentication setup for email failed. Please try again.The URL you use to access your DirectAdmin dashboard. Ends on :2222.The URL you use to access your Plesk dashboard. Ends on :8443.The URL you use to access your cPanel dashboard. Ends on :2083.The authentication code is not valid.The automatic installation of your certificate has failed. Please check your credentials, and retry the %sinstallation%s.The certificate installation was rate limited. Please try again later.The certs directory is not created yet.The certs directory was successfully created.The challenge directory is not created yet.The challenge directory was successfully created.The code to block code execution in the uploads folder cannot be added automatically on nginx. Add the following code to your nginx.conf file:The content security policy has many options, so we always recommend starting in ‘learning mode’ to see what files and scripts are loaded.The daily scan will report any detected file changes in the table below.The email address was not set. Please set the email addressThe following directories do not have the necessary writing permissions.The following information is attached when you send this form: license key, scan results, your domain, .htaccess file, debug log and a list of active plugins.The key directory is not created yet.The key directory was successfully created.The key is not valid.The lightweight Firewall can be used to lockout malicious traffic from your site. You can configure generic rules below, or block specific IP addresses by adding them to the Blocklist.The mixed content fixer could not be detected due to a cURL error: %s. cURL errors are often caused by an outdated version of PHP or cURL and don't affect the front-end of your site. Contact your hosting provider for a fix.The mixed content fixer is active, but was not detected on the frontpage.The non-www version of your site does not point to this website. This is recommended, as it will allow you to add it to the certificate as well.The onboarding wizard will help to configure essential security features in 1 minute! Select your hosting provider to start.The order is invalid, possibly due to too many failed authorization attempts. Please start at the previous step.The preferred method is not set.The required directories have the necessary writing permissions.The selected provider is not valid.The settings below determine how strict your site will be protected. You can leave these settings on their default values, unless you experience issues.The snapshots will be updated after WordPress, plugins or themes are activated or updated.The system is not ready for the DNS verification yet. Please run the wizard again.The system is not ready for the installation yet. Please run the wizard again.The used domain for your email address is not allowed.The user ID is not valid.The user and IP address will be temporarily unable to login for the specified duration. You can block IP addresses indefinitely via the IP addresses block.The user object is not valid.The value, WP_DEBUG_DISPLAY, has either been enabled by WP_DEBUG or added to your configuration file. This will make errors display on the front end of your site.The value, WP_DEBUG_LOG, has been added to this website’s configuration file. This means any errors on the site will be written to a file which is potentially available to all users.The wp-config.php file is not writable, and needs to be edited. Please set this file to writable.The www version of your site does not point to this website. This is recommended, as it will allow you to add it to the certificate as well.There are existing keys, the order had to be cleared first.There have been too many failed two-factor authentication attempts, which often indicates that the password has been compromised. The password has been reset in order to protect the account.These notifications are set to the minimum risk level that triggers a notification. For example, the default site-wide notification triggers on high-risk and critical vulnerabilities.These security headers are the fundamental security measures to protect your website visitors while visiting your website.They might be misused if you don’t actively tell the browser to disable these features.This adds extra requirements for strong passwords for new users and updated passwords.This appears to be an invalid license key for this plugin.This email address is used to create a Let's Encrypt account. This is also where you will receive renewal notifications.This email is confirmation that any security notices are likely to reach your inbox.This email was sent toThis feature allows you to block visitors from your website based on countryThis feature depends on multiple standard background processes. If a process fails or is unavailable on your system, detection might not work. We run frequent tests for this purpose. We will notify you accordingly if there are any issues.This is a multisite configuration with subdomains. You should generate a wildcard certificate on the root domain.This is a security feature implemented by web browsers to control how web pages from different origins can interact with each other.This is the vulnerability overview. Here you will find current known vulnerabilities on your system. You can find more information and helpful, actionable insights for every vulnerability under details.This leads to issues when activating SSL networkwide since subdomains will be forced over SSL as well while they don't have a valid certificate.This list shows all individually blocked IP addresses. On top the top-right you can filter between permanent blocks and temporary blocks. By default, blocks are only temporary, as attackers and bots will frequently alter between IP addresses. However, you can manually configure permanent blocks.This option is handled by the Content Security Policy/frame-ancestors setting.This setting will block attempts to assign administrator roles outside the native user creation process by WordPress. This might include other plugins that create, edit or assign roles to users. If you need to create an administrator in a third-party plugin, temporarily disable this setting while you make the changes.This site requires you to secure your account with a second authentication method.This will include both the www. and non-www. version of your domain.This will limit or fully disable HTTP requests that are not needed, but could be used with malicious intent.This will permanently change your database prefixes and you can NOT rollback this feature. Please make sure you have a back-up.This will send emails about vulnerabilities directly from your server. Make sure you can receive emails by the testing a preview below. If this feature is disabled, please enable notifications under general settings.ThresholdTime leftTo ensure all traffic passes through SSL, please enable a 301 redirect.To safely enable SSL on your server configuration, you should add the following line of code to your wp-config.php.Token not generated. Please complete the previous step.Token not received yet.Token successfully retrieved. Click the refresh button if it's not visible yet.Too many invalid verification codes, you can try again in %s. This limit protects your account against automated attacks.Trigger Captcha on lockoutTrigger captcha on failed login attemptTrustedTrusted IP addressesTrying to create directory in root of website.Two years (required for preload)Two-Factor Authentication adds an extra layer of security to your account. You can enable it here.Two-Factor Authentication for TOTP failed. No Authentication code provided, please try again.Two-Factor Authentication is mandatory for your account, so you need to make a selection.Two-Factor Backup Codes for %sTwo-Factor authentication allows users to login using a second authentication method, other than their e-mail address and password. It is one of the most powerful ways to prevent account theft.Two-Factor: You are out of backup codes and need to <a href="%s">regenerate!</a>TypeUnable to connect to cPanelUnable to enable Backup Codes provider for this user.Unable to enable TOTP provider for this user.Unable to save Two Factor Authentication code. Please re-scan the QR code and enter the code provided by your application.Unauthorized administratorsUnset X-Powered-By headerUpdate Really Simple SSL Pro: the plugin needs to be updated to the latest version to be compatible.UpgradeUploads folder not writable.Usage of the title attribute on the login logo is not recommended for accessibility reasons. Use the link text instead.Use an authenticator app on your mobile device to generate a code.Use your authenticator app like Google Authenticator to scan the QR code below, then paste the provided Authentication code. %sUserUser roleUser roles for password changeUsernameUsername 'admin' has been changed to %sUsersUsers trying to enter via /wp-admin or /wp-login.php will be redirected to this URL.Validating license...Verification Code:Verify emailVerify your emailViewView DashboardView settings pageView vulnerabilitiesVisit DashboardVisit the plugins overview or %srenew your license%s.VulnerabilitiesVulnerabilities OverviewVulnerabilities detectedVulnerability Alert: %sVulnerability MeasuresVulnerability scanVulnerability scanning is enabled.Vulnerability: %sWarningWarning: There has been %1$s failed login attempt on your account without providing a valid two-factor token. The last failed login occurred %2$s ago. If this wasn't you, you should reset your password.Warning: %1$s failed login attempts have been detected on your account without providing a valid two-factor token. The last failed login occurred %2$s ago. If this wasn't you, you should reset your password.WarningsWe detected suspected bots triggering large numbers of 404 errors on your site.We have detected administrator roles where the login and display names are the same.We have detected the %s plugin on your website.We have not detected any known hosting limitations.We have tried to make our Wizard as simple and fast as possible. Although these questions are all necessary, if there’s any way you think we can improve the plugin, please let us %sknow%s!We think you will like thisWelcome to Really Simple SecurityWhy Premium Support?Why did I receive this email?Widget areaWidget with mixed contentWill run a frequent update process on vulnerable components.WordPress 301 redirect enabled. We recommend to enable a 301 .htaccess redirect.Write these down!  Once you navigate away from this page, you will not be able to view these codes again.XML-RPCXML-RPC is a mechanism originally implemented into WordPress to publish content without the need to actually login to the backend. It is also used to login to WordPress from devices other than desktop, or the regular wp-admin interface.XML-RPC with Learning ModeYes (don't set header)You already have a valid SSL certificate.You already have free SSL on your hosting environment.You can add any non-existing username to this table, to instantly block IP addresses that try common usernames like "admin".You can choose to automate the most common actions for a vulnerability. Each action is set to a minimum risk level, similar to the notifications. Please read the instructions to learn more about the process.You can easily block countries, or entire continents. You can act on the event log below and see which countries are suspicious, or exclude all countries but your own.You can find your Plesk username and password in %sYou can find your api key %shere%s (make sure you're logged in with your main account).You can follow these %sinstructions%s.You can indefinitely block known abusive IP addresses, to completely prevent them from trying to login.You can prevent IP addresses from being temporarily blocked by adding them to this list. This can be convenient if you share an IP address with other site users. Usernames that trigger false logins will still be blocked.You can prevent usernames from being temporarily blocked by adding them to this list. The IP address that triggers false logins will still be blocked.You can protect your account with a second authentication layer. Please choose one of the following methods, or click %s if you don’t want to use Two-Factor Authentication.You can reset the report and generate a new snapshot, for example if you made changes via FTP.You have %s critical vulnerabilityYou have %s critical vulnerabilitiesYou have %s high-risk vulnerabilityYou have %s high-risk vulnerabilitiesYou have %s low-risk vulnerabilityYou have %s low-risk vulnerabilitiesYou have %s medium-risk vulnerabilityYou have %s medium-risk vulnerabilitiesYou have %s open hardening feature.You have %s open hardening features.You have changed your login URLYou have enabled a feature on %s. We think it's important to let you know a little bit more about this feature so you can use it without worries.You have logged in successfully.You have set a 301 redirect to SSL. This is important for SEO purposesYou may need to login in again, have your credentials prepared.You run a Multisite installation with subdomains, but your site doesn't have a wildcard certificate.You run a Multisite installation with subfolders, which prevents this plugin from fixing your missing server variable in the wp-config.php.You should have the www domain pointed to the same website as the non-www domain.You will have to re-scan the QR code on all devices as the previous codes will stop working.You will receive an email warning if changes are detected.You're using a feature where email is an essential part of the functionality. Please validate that you can send emails on your server.Your 2FA grace period expired. Please contact your site administrator to regain access and to configure 2FA.Your Key and Certificate directories are not properly protected.Your SSL certificate will expire soon.Your certificate is valid until: %sYour certificate will be renewed and installed automatically.Your certificate will expire on %s.Your certificate will expire on %s. You can renew it %shere%s.Your domain meets the requirements for Let's Encrypt.Your hosting environment does not allow automatic SSL installation.Your license is not active for this URL.Your license key expired on %s.Your license key has been disabled.Your license key has reached its activation limit.Your login URL has changed to {login_url} to prevent common bot attacks on standard login URLs. Learn more about this feature, common questions and measures to prevent any issues.Your login confirmation code for %sYour password was compromised and has been resetYour password was reset because of too many failed Two Factor attempts. You will need to <a href="%s">create a new password</a> to regain access. Please check your email for more information.Your server provides shell functionality, which offers additional methods to install SSL. If installing SSL using the default methods is not possible, you can install the shell add on.Your site is set to display errors on your websiteYour site is set to log errors to a potentially public fileYour site uses Divi. This can require some additional steps before getting the secure lock.Your site uses Elementor. This can require some additional steps before getting the secure lock.Your site uses plain permalinks, which causes issues with the REST API. Please use a different permalinks configuration.Your verification code expired, click “Resend Code” to receive a new verification code.Your website's ip address is blocked. Please add your domain's ip address to the security policy in CPanelYour wp-config.php has to be edited, but is not writable.attemptscriticaldaydayseg. %sforbidden - number in author name not allowed = %shCaptchahCaptcha secret keyhCaptcha site keyhigh-riskhttps://really-simple-plugins.comhttps://really-simple-ssl.comhttps://wordpress.org/low-riskmedium-riskno responsenot setreCaptcha secret keyreCaptcha site keyreCaptcha v2recommendedsite&larr; Go to %sPO-Revision-Date: 2024-09-17 07:31:18+0000
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Plural-Forms: nplurals=2; plural=n != 1;
X-Generator: GlotPress/4.0.1
Language: en_CA
Project-Id-Version: Plugins - Really Simple Security &#8211; Simple and Performant Security (formerly Really Simple SSL) - Stable (latest release)
 Please note that you can always save and finish the wizard later, use our %sdocumentation%s for additional information or log a %ssupport ticket%s if you need our assistance.%1$s &lsaquo; %2$s &#8212; WordPress%d seconds%d:%02d minutes%d:%02d:%02d hours%s day%s days%s hour%s hours%s is a singleton class and you cannot create a second instance.%s minutes%s month%s months%s unused code remaining.%s unused codes remaining.%s vulnerability has been detected.%s vulnerabilities have been detected.%s week%s: %s vulnerability found%s: %s vulnerabilities found(opens in a new tab)(recommended)(unknown).htaccess does not exist.htaccess in uploads not writable.htaccess not writable.htaccess redirect.1 day1 hour1 year2 years30 minutes301 .htaccess redirect301 .htaccess redirect (read instructions first)301 .htaccess redirect is not enabled.301 PHP redirect301 SSL redirect enabled301 redirect to https set.404 Blocking48 hours (default)6 months8 hours (recommended)A %s vulnerability is found in %s.A correctly configured Content Security Policy can protect your visitors from the most common web attacks. It all starts with denying and upgrading insecure requests on your website.A debug.log is publicly accessibile and has a standard location. This will change the location to a randomly named folder in /wp-content/A definition of a site url or home url was detected in your wp-config.php, but the file is not writable.A firewall rule was enabled, but /the wp-content/ folder is not writable.A firewall rule was enabled, but the firewall does not seem to get loaded correctly.A firewall rule was enabled, but the wp-config.php is not writable.A lockout will occur if an IP address exceeds the threshold within the given timeframe. Select ‘%s’ if you want to disable 404 blocking.A networkwide SSL activation process has been started, but has not been completed. Please go to the SSL settings page to complete the process.A verification code has been sent to the email address associated with your account to verify functionality.A verification code has been sent to the email address associated with your account.API login for user disabled.Able to create destination folderAbout Cross Origin PoliciesAbout Essential Security HeadersAbout HTTP Strict Transport SecurityAbout HardeningAbout Limit Login AttemptsAbout VulnerabilitiesAbout XML-RPCAbout notificationsAbout the Content Security PolicyAbout the Mixed Content ScanAbout the Permission PolicyAccording to our information, your hosting provider does not allow any kind of SSL installation, other then their own paid certificate. For an alternative hosting provider with SSL, see this %sarticle%s.According to our information, your hosting provider supplies your account with an SSL certificate by default. Please contact your %shosting support%s if this is not the case.ActionActivateActivate SSLActivate SSL per site or install a wildcard certificate to fix this.Activate network-wide to fix this.Activate your license keyActivating plugin...ActiveAdd additional domains which can embed your website, if needed. Comma separated.AdvancedAdvanced HardeningAdvanced WordPress HardeningAdvanced hardening features complement the basic hardening functions by protecting your site against advanced threats and attacks.Advanced hardening features to protect your site against sophisticated threats and attacks.After completing the installation, you can continue to the next step to complete your configuration.After enabling this feature, you can submit your site to %shstspreload.org%sAfter this number of failed login attempts the user and IP address will be temporarily blocked.Alias domain check is not relevant for a subdomainAllAll recommended hardening features enabled.AllowAllow grace periodAllow only necessary third party resources to be loaded on your website, thus preventing common attacks. Use our unique learning mode to automatically configure your Content Security Policy.Allow visitors that might accidentally exceed the threshold to unblock themselves using a Captcha.Allow your domain to be embeddedAllowedAllows you to enter a custom login URL.An SSL certificate has been detectedAn error occurred, please try again.An error occurred:An option that requires the .htaccess file in the uploads directory is enabled, but the file is not writable.An option that requires the .htaccess file is enabled, but the file does not exist.An option that requires the .htaccess file is enabled, but the file is not writable.As a security precaution, the username ‘admin’ has been changed on %s. From now on, you can login with '%s' or an email address.As your order will be regenerated, you'll need to update your DNS text records.Attempting to install certificate using AutoSSL...Attempting to install certificate...Attempting to set DNS txt record...AuthenticateAuthentication Code:Authentication code is incorrect.Authentication codes will be sent to %s.Authentication provider not specified.Authenticator AppAuthenticator App (TOTP)Authenticator appAuthorisation not completed yet.Automated MeasuresAutomatic certificate detection is not possible on your server.Automatic renewal of your certificate was not possible. The SSL certificate should be %srenewed%s manually.Backup CodesBasicBecause the $_SERVER["HTTPS"] variable is not set, your website may experience redirect loops.Below you will find the instructions for different hosting environments and configurations. If you start the process with the necessary instructions and credentials, the next steps will be done in no time.Below you will find your login code for %1$s. It's valid for 15 minutes. %2$sBlock the username 'admin'Block user registrations when login and display name are the sameBlockedBlocked IP addresses will be automatically unblocked after the above-configured interval. In the table below you can instantly unblock IP addresses.Blocked usernames will be automatically unblocked after the above-configured interval. In the table below you can instantly unblock usernames.BlocklistsBrowser features are plentiful, but most are not needed on your website.Bundle not available yet...By default, WordPress shows if a username or email address exists when a login fails. This will change it to generic feedback.cPanel hostcPanel passwordcPanel recognised. Possibly the certificate can be installed automatically.cPanel usernameCancelCaptchaCaptcha has not yet been verified, you need to complete the process of a Captcha to verify it's availability.Captcha providerCertificate already generated. It was renewed if required.Certificate not created.Challenge directory not writable.Change debug.log file locationChange passwords everyChanged debug.log location to:Changing redirect methods should be done with caution. Please make sure you have read our instructions beforehand at the right-hand side.Cheatin&#8217; uh?Check againCheck manuallyCheck your %slicence%s.Checking SSL certificate...Checking alias domain...Checking certs directory...Checking challenge directory reachable over http...Checking challenge directory...Checking for subdomain setup...Checking for website configuration...Checking host...Checking if cURL is available...Checking if Terms & Conditions are accepted...Checking if plugin folder exists...Checking key directory...Checking permissions...Checking server software...Choose new username to replace 'admin'Choose the max-age for HSTSChoose your providerClick the button below to confirm your email address, or copy the following URL: %sCloudWays API keyCloudWays user emailCode was was invalid, try "Resend Code"Codes only available for 5 minutesComplete email validation and enable notifications to make sure you will receive security warnings.CompletedComplianz - Consent Management as it should beComponentComponents will be quarantined if the update process fails.Compromised password for %s has been resetCompromised password resetConfigurationConfigure your Cookie Notice, Consent Management and Cookie Policy with our Wizard and Cookie Scan. Supports GDPR, DSGVO, TTDSG, LGPD, POPIA, RGPD, CCPA and PIPEDA.Configured for HTTP challengeConsent management as it should be.Content Security PolicyContent Security Policy HeadersContinentContinentsContinueContinue to renew.Control and monitor the use of XML-RPC on your site with learning mode.Control browser features that could allow third parties to misuse data collected by microphone, camera, GEO Location etc, when enabled for your website.Copy setup keyCopyright warning!Could not automatically add TXT record. Please proceed manually, following the steps below.Could not copy code execution test file.Could not copy text: Could not create test folder and file.Could not find code execution test file.Could not reach challenge directory over %s.Could not rename folder!Could not retrieve server listCould not test certificateCould not verify TXT record for domain %sCould not verify alias domain.CountCountryCrawlers might scan your site looking for possible exploits. One way to detect this is the fact that they trigger more 404 (not found) errors than legitimate visitors would. Below you can set the threshold and lockout duration for 404 blocking.Creating account...CriticalCritical (default)Cross Origin Embedder PolicyCross Origin Opener PolicyCross Origin Resource PolicyCustom login URLCustomize login attempts, intervals, and temporary lockouts according to your preferences to regulate the level of security on your website during authentication. No additional settings requiredDNS records were not verified yet. Please complete the previous step.DNS token not retrieved.DNS verificationDashboardDashboard - Test NotificationDateDebug.logDelete all data on plugin deletionDepending on your hosting provider, %1$smanual installation%2$s may be required.DescriptionDestination folder already existsDetailsDetected File ChangesDetected status of your setup.Direct Admin URLDirectAdmin hostDirectAdmin passwordDirectAdmin recognised. Possibly the certificate can be installed automatically.DirectAdmin usernameDirectiveDirectoriesDisableDisable "anyone can register"Disable HTTP methodsDisable OCSP staplingDisable XML-RPCDisable application passwordsDisable directory browsingDisable the built-in file editorsDisable user enumerationDisabledDismissDismiss all notificationsDo you want to store these credentials for renewal purposes?DomainDon't ask againDon't show againDon't use Two-Factor AuthenticationDownloadDownload Backup CodesDownload CodesDue to a change in challenge type, the order had to be reset. Please start at the previous step.During the grace period users can configure their Two-Factor method. When the grace period ends, users for which 2FA is enforced won’t be able to login unless 2FA is correctly configured. The grace period is also applied to new users.E-mail loginEasily improve site security with WordPress Hardening, Two-Factor Authentication (2FA), Login Protection, Vulnerability Detection and SSL certificate generation.Elevate your security with our Premium Support! Our expert team ensures simple, hassle-free assistance whenever you need it.EmailEmail VerificationEmail Verification sends a verification code to the user’s email address. This method provides protection against leaked or weak passwords, though it is less secure than other 2FA methods. If a user’s email inbox is compromised, one could still get access to the user account. It is not recommended to allow Email Verification for administrators.Email addressEmail address not validEmail could not be sent.Email could not be sent. No message or subject set.Email notification errorEmail notifications are only sent for important updates, security notices or when certain features are enabled.Email sent! Please check your mailEmail validationEmail validation completedEmail verificationEmail verification errorEnableEnable .htaccess only if you know how to regain access in case of issues.Enable 301 .htaccess redirectEnable 301 redirectEnable Custom login URLEnable FirewallEnable Limit Login AttemptsEnable Permissions PolicyEnable Two-Factor AuthenticationEnable a .htaccess redirect or PHP redirect in the settings to create a 301 redirect.Enable compromised password checkEnable for:Enable open source blocklist API etc.Enable the Vulnerability scan to detect possible vulnerabilities.Enable vulnerability scanningEnabledEnabling auto renew...Enforce for:Enforce frequent password changeEnforce secure password policies for your users by requiring strong passwords, and expiring passwords after a period of your choosing.Enforce strong passwordsEnforcing 2FA ensures that all users with the selected roles must login using Two-Factor Authentication. It is strongly recommended to at least enforce 2FA for Administrators.Enter a backup verification code.Enter a custom login URL. This allows you to log in via this custom URL instead of /wp-admin or /wp-login.phpError code %sError enabling auto renew for Let's EncryptError occurred when retrieving the webpage.Errors were reported during installation.Essential Security HeadersEssential WordPress hardeningEssential securityEssential security headers installedEventEvent LogEvent LogsEvery three hoursExample: If you want to change your login page from /wp-admin/ to /control/ answer: controlExperience all powerful features of Really Simple Security Pro using this %slimited time discount%s: %sFailed retrieving access tokenFailed retrieving account.Failed to activate pluginFailed to create a login nonce.Failed to gather package informationFailed to install pluginFeatureFeedback in plugin overviewFile Change DetectionFile Change Detection generates a snapshot of every .php and .js file. On a daily basis, each file is then compared to this snapshot.File missing. Please retry the previous steps.File permissions checkFiles not created yet...FirewallFirewall RulesFor more information, please read this %sarticle%sForce updateFrom now on, the debug.log won’t be publicly accessible whenever wp-debugging is enabled. The debug log will be stored in a randomly named folder in /wp-content/. This prevents possible leakage of sensitive debugging information.GDPR/CCPA Privacy SuiteGeneralGeneral SettingsGenerate Verification CodesGenerating SSL certificate...GenerationGet Login Protection with Really Simple Security ProGet detailed insights into visitors' behaviour with Burst Statistics, the privacy-friendly analytics dashboard from Really Simple Plugins.Get notified of important changes, updates and settings. Recommended when using security features.Go to activationGo to installationHSTS forces browsers always to load a website via HTTPS. It prevents unnecessary redirects and prevents manipulation of data originating from communication with your website.HTTP Strict Transport SecurityHardeningHardening features limit the possibility of potential weaknesses and vulnerabilities which can be misused.Hello %1$s, an unusually high number of failed login attempts have been detected on your account at %2$s.

These attempts successfully entered your password, and were only blocked because they failed to enter your second authentication factor. Despite not being able to access your account, this behavior indicates that the attackers have compromised your password. The most common reasons for this are that your password was easy to guess, or was reused on another site which has been compromised.

To protect your account, your password has been reset, and you will need to create a new one. For advice on setting a strong password, please read %3$s

To pick a new password, please visit %4$s

This is an automated notification. If you would like to speak to a site administrator, please contact them directly.Hello, this is a notice from your website to inform you that an unusually high number of failed login attempts have been detected on the %1$s account (ID %2$d). Those attempts successfully entered the user's password, and were only blocked because they entered invalid second authentication factors. To protect their account, the password has automatically been reset, and they have been notified that they will need to create a new one. If you do not wish to receive these notifications, you can disable them with the `two_factor_notify_admin_user_password_reset` filter. See %3$s for more information. Thank youHere you can configure vulnerability detection, notifications and measures. To learn more about the features displayed, please use the instructions linked in the top-right corner.Here you can see which users have configured Two-Factor Authentication. The reset button will trigger the 2FA onboarding for the selected user(s) again and allow the configured grace period.Here you control the users that are automatically, and temporarily blocked. You can also add or remove users manually. We recommend blocking ‘admin’ as username as a start.HiHide the remember me checkboxHide your WordPress versionHigh-riskHigh-risk (default)HostingHosting providerI agree to the Terms & Conditions from Let's Encrypt.I don't know, or not listed, proceed with installationI have read and understood the risks to intervene with these measures.IP AddressIP AddressesIP Addresses can be allowed, blocked or will show up when your settings add them to a temporary blocklist. If you want to add your IP to the allowlist, please read the article provided at the right-hand side for instructions.IP BlocklistIP address overviewIf the number of failed login attempts is exceeded within this timeframe, the IP address and user will be blocked.If the username 'admin' currently exists, you can rename it here. Please note that you can no longer use this username, and should use the new username or an email addressIf there's a vulnerability, you will also get feedback on the themes and plugin overview.If this is not the case, don't add this alias to your certificate.If this option is set to true, the mixed content fixer will fire on the init hook instead of the template_redirect hook. Only use this option when you experience problems with the mixed content fixer.If unexpected file changes have occurred, this could be an indication that your site is compromised.If you are the owner of this account, please check your email for instructions on regaining access.If you entered your DNS records before, they need to be changed.If you recognize the detected changes, you can add the files to the exclude list, or ignore them just once.If your site is only intended for users to login from specific geographical regions, you can entirely prevent logins from certain continents or countries.Implement Two-Factor Authentication or Passkey login.Import and insert fileImprove security - UpgradeImprove security by requiring strong passwords and forced periodic password changesImprove the default WordPress password strength check. You can also enforce frequent password changes for user roles.Include aliasInclude preloadInclude subdomainsInstallInstall %sManually%s.Install Authentication app:Install SSL certificateInstallationInstallation failed.Installation finishedInstalledInstallingInstalling SSL certificate using PLESK API...Installing SSL certificate...Installing plugin...Instantly configure these essential features.InstructionsIntervalInvalid Two Factor Authentication code.Invalid Two Factor Authentication secret key.Invalid licence.Invalid login details.Invalid providerInvalid two-factor authentication provider.Invalid verification code.It is not possible to install Let's Encrypt on a localhost environment.It is not possible to install Let's Encrypt on a subfolder configuration.It is not possible to install Let's Encrypt on a subsite. Please go to the main site of your website.Keep your site secure by monitoring unexpected file changes.Key copiedLax - 10 errors in 2 secondsLearn moreLearn more about our features!Learn more about security headersLeave a reviewLet's EncryptLet's Encrypt.Letʼs Encrypt is a free, automated and open certificate authority brought to you by the nonprofit Internet Security Research Group (ISRG).Leveraging your SSL certificate with HSTS is a staple for every website. Force your website over SSL, mitigating risks of malicious counterfeit websites in your name.Licence invalidLicence validLightweight SSL & Hardening PluginLimit AttemptsLimit Login AttemptsLimit Login Attempts protects your site from login attempts by unauthorised users. When you enable Limit Login Attempts, all login attempts are logged and repeated attempts to login with invalid credentials will be blocked automatically.Limit logged in session durationLocationLocked-outLockout durationLog InLogin ProtectionLogin attemptsLogin credentials incorrectLogin credentials incorrect. Please check your log-in credentials for cPanel.Login statusLogsLow-riskLow-risk Low-risk (default)Maintain peace of mind with our simple, but effective automated measures when vulnerabilities are discovered. When needed Really Simple Security will force update or quarantaine vulnerable components, on your terms!Many vulnerabilities are exploited by injecting a user with administrator capabilities outside of the native WordPress creation process. Under advanced hardening you can prevent this from happening.Maybe laterMeasuresMedium-riskMethodMissing licence.Mixed Content FixerMixed Content ScanMixed contentMixed content fixerMixed content fixer - back endMixed content fixer - init hookMixed content fixer not enabled. Enable the option to fix mixed content on your site.Mixed content in %sMixed content in CSS/JS file from other domainMixed content in PHP file in %sMixed content in post: %sMixed content in the postmeta tableMixed content scanMore infoMultiple %s vulnerabilities have been found.No 301 redirect is set. Enable the WordPress 301 redirect in the settings to get a 301 permanent redirect.No 301 redirect to SSL enabled.No SSL certificate has been detected.No SSL detectedNo SSL detected. Use the retry button to check again.No known vulnerabilities detectedNo recommended redirect rules detected.No redirectNo subdomain setup detected.No valid list of domains.NoneNormal - 10 errors in 5 secondsNot recognised server.Not sure if you're using XML-RPC, or want to restrict unauthorised use of XML-RPC? With learning mode you can see exactly which sources use XML-RPC, and you can revoke where necessary.NoteNotification by %sNotificationsNotifications by emailOCSP not supported, the certificate will be generated without OCSP.OCSP stapling is configured as enabled by default. You can disable this option if this is not supported by your hosting provider.OffOn Apache you can use a .htaccess redirect, which is usually faster, but may cause issues on some configurations. Read the instructions in the sidebar first.Once every 5 minutesOnce every dayOnce every weekOne click SSL optimisationOne day (for testing only)One of the most powerful features, and therefore the most complex are the Cross-Origin headers that can isolate your website so any data leaks are minimised.One yearOnly enable this if you experience mixed content in the admin environment of your WordPress website.OpenOrder ID mismatch, regenerate order.Order successfully created.Order successfully retrieved.Package information retrievedPassword ResetPassword SecurityPassword securityPasswordsPermanentPermanent blockPermission denied.Permissions PolicyPlease %sconsider upgrading to Pro%s to enjoy all simple and performant security features.Please activate it manually on your hosting dashboard.Please activate it on your dashboard %smanually%sPlease add the following lines to your .htaccess, or set it to writable:Please adjust the CAA records via your DNS provider to allow Let’s Encrypt SSL certificatesPlease change your email address %shere%s and try again.Please check if the advanced-headers.php file is included in the wp-config.php, and exists in the wp-content folder.Please check if the non www version of your site also points to this website.Please check if the www version of your site also points to this website.Please check if your REST API is loading correctly. Your site currently is using the slower Ajax fallback method to load the settings.Please check the vulnerabilities overview for more information and take appropriate action.Please complete %smanually%sPlease complete manually in your hosting dashboard.Please complete the following step(s) first: %sPlease configure your %sCaptcha settings%s before enabling this settingPlease create a folder 'rsssl' in the uploads directory, with 644 permissions.Please double check your DNS txt record.Please enter the code generated by your authenticator app.Please make sure to configure a method, access to your account will be denied if no method is configured today.Please make sure to configure a method, access to your account will be denied if no method is configured within the next %s days.Please refresh the SSL status if a certificate has been installed recently.Please scan the QR code or manually enter the key, then enter an authentication code from your app in order to complete setup.Please set the wp-config.php to writable until the rule has been written.Please set the wp-content folder to writable:Please start at the previous step.Please take appropriate action.Please verify your emailPlease wait %s before trying again, as this is the expiration of the DNS record currently.Plesk admin URLPlesk hostPlesk passwordPlesk recognised. Possibly the certificate can be installed automatically.Plesk usernamePlesk username and passwordPlugin activatedPlugin installedPowered by WordPressPreferred MethodPremium SupportPrevent clickjacking and other malicious attacks by restricting sources that are permitted to embed content from your website.Prevent code execution in the public 'Uploads' folderPrevent login feedbackPrevent session hijackingPrevent usage of passwords that have been included in a databreach. This securely verifies part of the hashed password via the Have I Been Pwned API.Privacy-friendly analytics tool.Protect your login form with Limit Login Attempts.Protect your site against brute force login attacks by limiting the number of login attempts. Enabling this feature will temporary lock-out a username and the IP address that tries to login, after the set number of false logins.Protect your site with a performant Firewall.Protect your website against brute-force attacks with a captcha. Choose between Google reCAPTCHA or hCaptcha.Protecting your website visitors from malicious attacks and data breaches should be your #1 priority, start with the essentials with Really Simple SecurityBackup Verification Codes (Single Use)EmailTime Based One-Time Password (TOTP)QuarantineQuarantinedRe-checkRead about our journey towards Really Simple SecurityRead moreRead more about security concerns with debug display enabledReally Simple PluginsReally Simple Plugins is also the author of the below privacy-focused plugins, including consent management, legal documents and analytics!Really Simple SSLReally Simple SSL is now %1$sReally Simple Security!%2$sReally Simple Security ProReally Simple Security allows you to limit the default logged in session duration. By default, WordPress will keep users logged in for 48 hours, or even 14 days when clicking the ‘remember me’ checkbox. An attacker could possibly steal the logged in cookie and gain access to a user’s account. Limiting the logged in duration to 8 hours will greatly reduce the risk of session hijacking.Really Simple Security dashboardReally Simple Security will send email notifications and security warnings from your server. We will send a test email to confirm that email is correctly configured on your site. Look for the confirmation button in the email.Receive a code by emailRecommended by Really Simple PluginsRecommended security headers enabled.Recovery Mode &#8212; %sRedirect methodRedirectionRedirects your site to https with a SEO friendly 301 redirect if it is requested over http.RegionsRename admin user enabled: Please choose a new username of at least 3 characters, which is not in use yet.Rename and randomise your database prefixRenew certificateRenew installationResend CodeReset KeyRestrict access from specific countries or continents. You can also allow only specific countries.Restrict creation of administrator rolesRetrieving Cloudways server data...Retrieving DNS verification token...Retrieving package information...RetryRiskRulesSSL Status TestSSL activation in progressSSL certificate should be generated and installed.SSL certificate will expire on %s.SSL is enabled networkwide.SSL is enabled on your site.SSL is not enabled on your networkSSL is not enabled yet.SSL is not enabled.SSL is not yet enabled on this site.SSL is now activated. Follow the three steps in this article to check if your website is secure.SSL successfully installed on %sSave and continueScan resultsSearching for link to SSL installation page on your server...Secret key is configured and registered. It is not possible to view it again for security reasons.SecuritySecurity HeadersSecurity Headers TestSecurity configuration completed!Security configuration not completed yet. You still have %s task open.You still have %s tasks open.Security through obscurity. Your site is no longer using the default wp_ prefix for database tables. The process has been designed to only complete and replace the tables after all wp_ tables are successfully renamed. In the unlikely event that this does lead to database issues on your site, please navigate to our troubleshooting article.See which recommended security headers are not present on your website.Selected providerSelf (Default)Self-hosted and privacy-friendly analytics tool.SendServe encrypted and authenticated responsesSet permissions to 644 to enable SSL generation.Set your wp-config.php to writable and reload this page.SettingsSettings update: .htaccess redirectSettings update: Database prefix changedSettings update: Debug.log file relocatedSettings update: Username 'admin' renamedSite wide - Test NotificationSite-wide, admin notificationSkipSkip (%1$d %2$s remaining)Skip (Only today remaining)SourceStart login protection by adding an additional layer during authentication. This will leave authentication less dependent on just a single password. Want to force strong passwords? Check out Password Security.StatusStop editing the .htaccess fileStore for renewal purposes. If not stored, renewal may need to be done manually.Strict - 10 errors in 10 secondsStrong Password policySubmitSuccessfully added TXT record.Successfully generated certificate.Successfully installed Let's EncryptSuccessfully installed SSLSuccessfully retrieved accountSuccessfully retrieved server ID and app IDSuccessfully verified DNS recordsSuccessfully verified alias domain.SupportSystem statusTOTP requires users to authenticate using a third-party app such as Google Authenticator.TemporaryTemporary blockTerms and conditionsTerms & Conditions are accepted.Terms and ConditionsTest not found.Test notification email errorTest notificationsTest notifications can be used to test email delivery and shows how vulnerabilities will be reported on your WordPress installation.The 'force-deactivate.php' file has to be renamed to .txt. Otherwise your SSL can be deactivated by anyone on the internet.The .htaccess redirect has been enabled on your site. If the server configuration is non-standard, this might cause issues. Please check if all pages on your site are functioning properly.The .htaccess redirect rules selected by this plugin failed in the test. Set manually or dismiss to leave on PHP redirect.The 301 .htaccess redirect is the fastest and most reliable redirect option.The 301 redirect with .htaccess to HTTPS is now enabled.The DISALLOW_FILE_EDIT constant is defined and set to false. You can remove it from your wp-config.php.The DNS response for %s was %s, while it should be %s.The EssentialsThe Event Log shows all relevant events related to limit login attempts. You can filter the log using the dropdown on the top-right to only show warnings.The Event Log shows all relevant events related to the Firewall and IP lockouts. You can filter the log using the dropdown on the top-right to only show warnings.The Hosting Panel software was not recognised. Depending on your hosting provider, the generated certificate may need to be installed manually.The IP address will see a locked out screen for the selected duration.The PHP function cURL has successfully been detected.The PHP function cURL is not available on your server, which is required. Please contact your hosting provider.The SSL certificate has been renewed, and requires manual %sinstallation%s in your hosting dashboard.The Terms & Conditions were not accepted. Please accept in the general settings.The Two-Factor Authentication setup for TOTP failed. Please try again.The Two-Factor Authentication setup for email failed. Please try again.The URL you use to access your DirectAdmin dashboard. Ends on :2222.The URL you use to access your Plesk dashboard. Ends on :8443.The URL you use to access your cPanel dashboard. Ends on :2083.The authentication code is not valid.The automatic installation of your certificate has failed. Please check your credentials, and retry the %sinstallation%s.The certificate installation was rate limited. Please try again later.The certs directory is not created yet.The certs directory was successfully created.The challenge directory is not created yet.The challenge directory was successfully created.The code to block code execution in the uploads folder cannot be added automatically on NGINX. Add the following code to your nginx.conf file:The content security policy has many options, so we always recommend starting in ‘learning mode’ to see what files and scripts are loaded.The daily scan will report any detected file changes in the table below.The email address was not set. Please set the email addressThe following directories do not have the necessary writing permissions.The following information is attached when you send this form: licence key, scan results, your domain, .htaccess file, debug log and a list of active plugins.The key directory is not created yet.The key directory was successfully created.The key is not valid.The lightweight Firewall can be used to lockout malicious traffic from your site. You can configure generic rules below, or block specific IP addresses by adding them to the Blocklist.The mixed content fixer could not be detected due to a cURL error: %s. cURL errors are often caused by an outdated version of PHP or cURL and don't affect the front-end of your site. Contact your hosting provider for a fix.The mixed content fixer is active, but was not detected on the frontpage.The non-www version of your site does not point to this website. This is recommended, as it will allow you to add it to the certificate as well.The onboarding wizard will help to configure essential security features in 1 minute! Select your hosting provider to start.The order is invalid, possibly due to too many failed authorisation attempts. Please start at the previous step.The preferred method is not set.The required directories have the necessary writing permissions.The selected provider is not valid.The settings below determine how strict your site will be protected. You can leave these settings on their default values, unless you experience issues.The snapshots will be updated after WordPress, plugins or themes are activated or updated.The system is not ready for the DNS verification yet. Please run the wizard again.The system is not ready for the installation yet. Please run the wizard again.The used domain for your email address is not allowed.The user ID is not valid.The user and IP address will be temporarily unable to login for the specified duration. You can block IP addresses indefinitely via the IP addresses block.The user object is not valid.The value, WP_DEBUG_DISPLAY, has either been enabled by WP_DEBUG or added to your configuration file. This will make errors display on the front end of your site.The value, WP_DEBUG_LOG, has been added to this website’s configuration file. This means any errors on the site will be written to a file which is potentially available to all users.The wp-config.php file is not writable, and needs to be edited. Please set this file to writable.The www version of your site does not point to this website. This is recommended, as it will allow you to add it to the certificate as well.There are existing keys, the order had to be cleared first.There have been too many failed two-factor authentication attempts, which often indicates that the password has been compromised. The password has been reset in order to protect the account.These notifications are set to the minimum risk level that triggers a notification. For example, the default site-wide notification triggers on high-risk and critical vulnerabilities.These security headers are the fundamental security measures to protect your website visitors while visiting your website.They might be misused if you don’t actively tell the browser to disable these features.This adds extra requirements for strong passwords for new users and updated passwords.This appears to be an invalid licence key for this plugin.This email address is used to create a Let's Encrypt account. This is also where you will receive renewal notifications.This email is confirmation that any security notices are likely to reach your inbox.This email was sent toThis feature allows you to block visitors from your website based on countryThis feature depends on multiple standard background processes. If a process fails or is unavailable on your system, detection might not work. We run frequent tests for this purpose. We will notify you accordingly if there are any issues.This is a multisite configuration with subdomains. You should generate a wildcard certificate on the root domain.This is a security feature implemented by web browsers to control how web pages from different origins can interact with each other.This is the vulnerability overview. Here you will find current known vulnerabilities on your system. You can find more information and helpful, actionable insights for every vulnerability under details.This leads to issues when activating SSL networkwide since subdomains will be forced over SSL as well while they don't have a valid certificate.This list shows all individually blocked IP addresses. On top the top-right you can filter between permanent blocks and temporary blocks. By default, blocks are only temporary, as attackers and bots will frequently alter between IP addresses. However, you can manually configure permanent blocks.This option is handled by the Content Security Policy/frame-ancestors setting.This setting will block attempts to assign administrator roles outside the native user creation process by WordPress. This might include other plugins that create, edit or assign roles to users. If you need to create an administrator in a third-party plugin, temporarily disable this setting while you make the changes.This site requires you to secure your account with a second authentication method.This will include both the www. and non-www. version of your domain.This will limit or fully disable HTTP requests that are not needed, but could be used with malicious intent.This will permanently change your database prefixes and you can NOT rollback this feature. Please make sure you have a back-up.This will send emails about vulnerabilities directly from your server. Make sure you can receive emails by the testing a preview below. If this feature is disabled, please enable notifications under general settings.ThresholdTime leftTo ensure all traffic passes through SSL, please enable a 301 redirect.To safely enable SSL on your server configuration, you should add the following line of code to your wp-config.php.Token not generated. Please complete the previous step.Token not received yet.Token successfully retrieved. Click the refresh button if it's not visible yet.Too many invalid verification codes, you can try again in %s. This limit protects your account against automated attacks.Trigger Captcha on lockoutTrigger captcha on failed login attemptTrustedTrusted IP addressesTrying to create directory in root of website.Two years (required for preload)Two-Factor Authentication adds an extra layer of security to your account. You can enable it here.Two-Factor Authentication for TOTP failed. No Authentication code provided, please try again.Two-Factor Authentication is mandatory for your account, so you need to make a selection.Two-Factor Backup Codes for %sTwo-Factor authentication allows users to login using a second authentication method, other than their e-mail address and password. It is one of the most powerful ways to prevent account theft.Two-Factor: You are out of backup codes and need to <a href="%s">regenerate!</a>TypeUnable to connect to cPanelUnable to enable Backup Codes provider for this user.Unable to enable TOTP provider for this user.Unable to save Two Factor Authentication code. Please re-scan the QR code and enter the code provided by your application.Unauthorised administratorsUnset X-Powered-By headerUpdate Really Simple SSL Pro: the plugin needs to be updated to the latest version to be compatible.UpgradeUploads folder not writable.Usage of the title attribute on the login logo is not recommended for accessibility reasons. Use the link text instead.Use an authenticator app on your mobile device to generate a code.Use your authenticator app like Google Authenticator to scan the QR code below, then paste the provided Authentication code. %sUserUser roleUser roles for password changeUsernameUsername 'admin' has been changed to %sUsersUsers trying to enter via /wp-admin or /wp-login.php will be redirected to this URL.Validating licence...Verification Code:Verify emailVerify your emailViewView DashboardView settings pageView vulnerabilitiesVisit DashboardVisit the plugins overview or %srenew your licence%s.VulnerabilitiesVulnerabilities OverviewVulnerabilities detectedVulnerability Alert: %sVulnerability MeasuresVulnerability scanVulnerability scanning is enabled.Vulnerability: %sWarningWarning: There has been %1$s failed login attempt on your account without providing a valid two-factor token. The last failed login occurred %2$s ago. If this wasn't you, you should reset your password.Warning: %1$s failed login attempts have been detected on your account without providing a valid two-factor token. The last failed login occurred %2$s ago. If this wasn't you, you should reset your password.WarningsWe detected suspected bots triggering large numbers of 404 errors on your site.We have detected administrator roles where the login and display names are the same.We have detected the %s plugin on your website.We have not detected any known hosting limitations.We have tried to make our Wizard as simple and fast as possible. Although these questions are all necessary, if there’s any way you think we can improve the plugin, please let us %sknow%s!We think you will like thisWelcome to Really Simple SecurityWhy Premium Support?Why did I receive this email?Widget areaWidget with mixed contentWill run a frequent update process on vulnerable components.WordPress 301 redirect enabled. We recommend to enable a 301 .htaccess redirect.Write these down!  Once you navigate away from this page, you will not be able to view these codes again.XML-RPCXML-RPC is a mechanism originally implemented into WordPress to publish content without the need to actually login to the backend. It is also used to login to WordPress from devices other than desktop, or the regular wp-admin interface.XML-RPC with Learning ModeYes (don't set header)You already have a valid SSL certificate.You already have free SSL on your hosting environment.You can add any non-existing username to this table, to instantly block IP addresses that try common usernames like "admin".You can choose to automate the most common actions for a vulnerability. Each action is set to a minimum risk level, similar to the notifications. Please read the instructions to learn more about the process.You can easily block countries, or entire continents. You can act on the event log below and see which countries are suspicious, or exclude all countries but your own.You can find your Plesk username and password in %sYou can find your api key %shere%s (make sure you're logged in with your main account).You can follow these %sinstructions%s.You can indefinitely block known abusive IP addresses, to completely prevent them from trying to login.You can prevent IP addresses from being temporarily blocked by adding them to this list. This can be convenient if you share an IP address with other site users. Usernames that trigger false logins will still be blocked.You can prevent usernames from being temporarily blocked by adding them to this list. The IP address that triggers false logins will still be blocked.You can protect your account with a second authentication layer. Please choose one of the following methods, or click %s if you don’t want to use Two-Factor Authentication.You can reset the report and generate a new snapshot, for example if you made changes via FTP.You have %s critical vulnerabilityYou have %s critical vulnerabilitiesYou have %s high-risk vulnerabilityYou have %s high-risk vulnerabilitiesYou have %s low-risk vulnerabilityYou have %s low-risk vulnerabilitiesYou have %s medium-risk vulnerabilityYou have %s medium-risk vulnerabilitiesYou have %s open hardening feature.You have %s open hardening features.You have changed your login URLYou have enabled a feature on %s. We think it's important to let you know a little bit more about this feature so you can use it without worries.You have logged in successfully.You have set a 301 redirect to SSL. This is important for SEO purposes.You may need to login in again, have your credentials prepared.You run a Multisite installation with subdomains, but your site doesn't have a wildcard certificate.You run a multisite installation with subfolders, which prevents this plugin from fixing your missing server variable in the wp-config.php.You should have the www domain pointed to the same website as the non-www domain.You will have to re-scan the QR code on all devices as the previous codes will stop working.You will receive an email warning if changes are detected.You're using a feature where email is an essential part of the functionality. Please validate that you can send emails on your server.Your 2FA grace period expired. Please contact your site administrator to regain access and to configure 2FA.Your Key and Certificate directories are not properly protected.Your SSL certificate will expire soon.Your certificate is valid until: %sYour certificate will be renewed and installed automatically.Your certificate will expire on %s.Your certificate will expire on %s. You can renew it %shere%s.Your domain meets the requirements for Let's Encrypt.Your hosting environment does not allow automatic SSL installation.Your licence is not active for this URL.Your licence key expired on %s.Your licence key has been disabled.Your licence key has reached its activation limit.Your login URL has changed to {login_url} to prevent common bot attacks on standard login URLs. Learn more about this feature, common questions and measures to prevent any issues.Your login confirmation code for %sYour password was compromised and has been resetYour password was reset because of too many failed Two Factor attempts. You will need to <a href="%s">create a new password</a> to regain access. Please check your email for more information.Your server provides shell functionality, which offers additional methods to install SSL. If installing SSL using the default methods is not possible, you can install the shell add-on.Your site is set to display errors on your websiteYour site is set to log errors to a potentially public fileYour site uses Divi. This can require some additional steps before getting the secure lock.Your site uses Elementor. This can require some additional steps before getting the secure lock.Your site uses plain permalinks, which causes issues with the REST API. Please use a different permalinks configuration.Your verification code expired, click “Resend Code” to receive a new verification code.Your website's IP address is blocked. Please add your domain's IP address to the security policy in cPanelYour wp-config.php has to be edited, but is not writable.attemptscriticaldaydayseg. %sforbidden - number in author name not allowed = %shCaptchahCaptcha secret keyhCaptcha site keyhigh-riskhttps://really-simple-plugins.comhttps://really-simple-ssl.comhttps://wordpress.org/low-riskmedium-riskno responsenot setreCaptcha secret keyreCaptcha site keyreCaptcha v2recommended&larr; Go to %s

Filemanager

Name Type Size Permission Actions
akismet-en_CA.mo File 24.22 KB 0644
akismet-en_CA.po File 34.25 KB 0644
aryo-activity-log-en_CA.mo File 11.93 KB 0644
aryo-activity-log-en_CA.po File 18.64 KB 0644
contact-form-7-en_CA-28b2966727a4eeea158f98250ee5b44b.json File 959 B 0644
contact-form-7-en_CA.l10n.php File 43.89 KB 0644
contact-form-7-en_CA.mo File 51.04 KB 0644
contact-form-7-en_CA.po File 72.63 KB 0644
elementor-en_CA-026e05eaa88cf2068ad476f7c5d5d51e.json File 338 B 0644
elementor-en_CA-066ef1cdf21d1b40c6de8f6422ec24e0.json File 938 B 0644
elementor-en_CA-087056f498f9670c54c0511c8654cc0f.json File 3.95 KB 0644
elementor-en_CA-1dbb8b6c1e3d0a728637a838a81040c6.json File 306 B 0644
elementor-en_CA-21b2026463ef175722764b7eaf9022f0.json File 295 B 0644
elementor-en_CA-23f8a12bf11e8b1bbfc99cf0797d6856.json File 3.94 KB 0644
elementor-en_CA-2fd0e05b3018b8194278f96ab069641f.json File 546 B 0644
elementor-en_CA-39ea43bece8992e71122e797802a94c7.json File 357 B 0644
elementor-en_CA-447a0216bbfde7c07c43b4340afd4cac.json File 301 B 0644
elementor-en_CA-44ea0c0b6c26f53d7cf64149d8ae9b03.json File 409 B 0644
elementor-en_CA-498ef4b5c136d8ffb9492430cfcb556c.json File 570 B 0644
elementor-en_CA-4a9aafdf461c74b88a1c7041526ae1d6.json File 862 B 0644
elementor-en_CA-50f7bdee322f202b88cb992c0ace0ac3.json File 7.3 KB 0644
elementor-en_CA-64add0440d2f0613154569a24f427bfc.json File 3.93 KB 0644
elementor-en_CA-6af6ba3e9884f98375cb3c84358312d9.json File 1.03 KB 0644
elementor-en_CA-6f2d71de6e487593b133a34107c809b5.json File 3.96 KB 0644
elementor-en_CA-79962d687013e1cf1388440cb23aaf23.json File 930 B 0644
elementor-en_CA-7b11194e20cdeeed80bffc166272edd8.json File 1.39 KB 0644
elementor-en_CA-7bd3d6cb6889e0684fb5850e5de15987.json File 472 B 0644
elementor-en_CA-875641fa8e2acb7d96b56de0fac67935.json File 342 B 0644
elementor-en_CA-8871b489e8d974572ae4c7578f939de5.json File 339 B 0644
elementor-en_CA-8b95a20e21550730e7b5557f56908c73.json File 1.45 KB 0644
elementor-en_CA-8ef6d4918e93bfaaef913c65efeec347.json File 495 B 0644
elementor-en_CA-91751ab1f6434be40ed42c6f2430685d.json File 3.93 KB 0644
elementor-en_CA-9c739050cf2f73944f5e6511cc8a11fc.json File 311 B 0644
elementor-en_CA-9de15ead6aa7b3bb8a1ea30a49991974.json File 611 B 0644
elementor-en_CA-a356d84da643b35ca48f18200424fa68.json File 327 B 0644
elementor-en_CA-a3bac97752b365511e337f750b1e7508.json File 330 B 0644
elementor-en_CA-a4027a255848e5a7096a4cbe99cd18da.json File 883 B 0644
elementor-en_CA-abe7facb531349e3b9bd791c4c0f183e.json File 364 B 0644
elementor-en_CA-ac76f1d75eb777f747e6708b19d31b78.json File 10.19 KB 0644
elementor-en_CA-bd7df0741aeddc2bbbb08d20c11e4ddc.json File 464 B 0644
elementor-en_CA-d3edc9236498fc3ec14d61ab5d722dcf.json File 578 B 0644
elementor-en_CA-dde11340ced68bea09c9fd29c9ed4534.json File 335 B 0644
elementor-en_CA-e16f2427ce816c4dc38ad0b36edc3ef2.json File 372 B 0644
elementor-en_CA-e9bd92fcd3a153fa19faf0be5f3e21b4.json File 403 B 0644
elementor-en_CA-edafd6bb20f92c5a76f673e753e9b748.json File 1.38 KB 0644
elementor-en_CA-f98be19bec7bc848ce3ed383c60037c1.json File 2.02 KB 0644
elementor-en_CA.l10n.php File 49.52 KB 0644
elementor-en_CA.mo File 64.97 KB 0644
elementor-en_CA.po File 212.95 KB 0644
elementor-pro-en_CA-87b9565b875d0e08e13328e78ea3f857.json File 310 B 0644
elementor-pro-en_CA.mo File 367 B 0644
elementor-pro-en_CA.po File 35.93 KB 0644
envato-elements-en_CA.mo File 1.8 KB 0644
envato-elements-en_CA.po File 2.78 KB 0644
health-check-en_CA.mo File 56.82 KB 0644
health-check-en_CA.po File 90.23 KB 0644
hello-dolly-en_CA.mo File 1.2 KB 0644
hello-dolly-en_CA.po File 1.53 KB 0644
post-type-switcher-en_CA.mo File 1.21 KB 0644
post-type-switcher-en_CA.po File 1.82 KB 0644
posts-and-users-stats-en_CA.mo File 3.24 KB 0644
posts-and-users-stats-en_CA.po File 5.84 KB 0644
premium-addons-for-elementor-en_CA.mo File 50.39 KB 0644
premium-addons-for-elementor-en_CA.po File 206.42 KB 0644
really-simple-ssl-en_CA-0095b576f64c1698d1d23c725d2da1ad.json File 321 B 0644
really-simple-ssl-en_CA-0b4bb6c641e5d439dfc95999bd9232ae.json File 308 B 0644
really-simple-ssl-en_CA-15f6778886f6647b0040e73346153a73.json File 11.89 KB 0644
really-simple-ssl-en_CA-2c14c1c7d5701789f05ed9f25401ff0b.json File 1.62 KB 0644
really-simple-ssl-en_CA-3894b089cd82666e9a4e77535094da45.json File 1.01 KB 0644
really-simple-ssl-en_CA-3c58b6e7c8b62fd3599df0641e21c59c.json File 1.14 KB 0644
really-simple-ssl-en_CA-5a61f05e4931284797a13bb6216a5f0a.json File 11.89 KB 0644
really-simple-ssl-en_CA-674c83d81a7b6ea6bdef4cc2caf638c5.json File 357 B 0644
really-simple-ssl-en_CA-84af82b5ae42fa9ccd14a0bc0c1cbfaf.json File 2.28 KB 0644
really-simple-ssl-en_CA-b79855382f99d4660356e1a4e4947d6d.json File 1.16 KB 0644
really-simple-ssl-en_CA-bf650d751228aee72abb21a7d075cf38.json File 1.14 KB 0644
really-simple-ssl-en_CA-df279e5f0e6d1ac85a692e21470ce62f.json File 993 B 0644
really-simple-ssl-en_CA-ef9f07b3b54711801a34147958e12504.json File 308 B 0644
really-simple-ssl-en_CA-fa4f7a887e789803d5ccfcbce66aa812.json File 1.16 KB 0644
really-simple-ssl-en_CA.l10n.php File 101.92 KB 0644
really-simple-ssl-en_CA.mo File 116.64 KB 0644
really-simple-ssl-en_CA.po File 175.18 KB 0644
shortcodes-ultimate-en_CA.mo File 67.53 KB 0644
shortcodes-ultimate-en_CA.po File 114.71 KB 0644
user-activity-log-en_CA.mo File 13.31 KB 0644
user-activity-log-en_CA.po File 20.21 KB 0644
user-role-editor-en_CA.mo File 20.83 KB 0644
user-role-editor-en_CA.po File 31.98 KB 0644
wordfence-en_CA-158c92fb002b70b2e65a3dc65a6281fa.json File 12.87 KB 0644
wordfence-en_CA-18f527efd451d6942f6c5314d7691fc7.json File 1.17 KB 0644
wordfence-en_CA-6b5735c89355179056de2cf85e2c51c6.json File 2.56 KB 0644
wordfence-en_CA-8fcd6eb89b59441f70a9ec20c0b139be.json File 335 B 0644
wordfence-en_CA.mo File 348.62 KB 0644
wordfence-en_CA.po File 509.77 KB 0644
wp-maintenance-mode-en_CA.mo File 15.22 KB 0644
wp-maintenance-mode-en_CA.po File 23.73 KB 0644
wp-statistics-en_CA.mo File 34.02 KB 0644
wp-statistics-en_CA.po File 74.38 KB 0644
wp-super-cache-en_CA-a0623ef93657e56554c5ddda522ed690.json File 697 B 0644
wp-super-cache-en_CA-a923b88be390014b9b8a402283415e0d.json File 608 B 0644
wp-super-cache-en_CA.l10n.php File 82.5 KB 0644
wp-super-cache-en_CA.mo File 90.4 KB 0644
wp-super-cache-en_CA.po File 104.6 KB 0644
wpforms-lite-en_CA.mo File 141.35 KB 0644
wpforms-lite-en_CA.po File 228.65 KB 0644