4,348
edits
Backup process Tag: visualeditor |
|||
(One intermediate revision by the same user not shown) | |||
Line 3: | Line 3: | ||
== Recommended file permissions == | == Recommended file permissions == | ||
* ''Last tested on CentOS 7 (2018/4/22)'' | |||
Private WordPress installations seem to be the drum that hackers like to hit on these days. It seems that many themes are also vulnerable as well. Anyway, as a starting point for fortifying a WP installation here are recommended file permissions settings for a WordPress installation on a Linux box. These commands will set 750 for all folders, 640 for files, and 600 for wp-config.php file. Sitting with a root/sudo access on a parent folder from a WP installation folder (assuming wpfolder here). | Private WordPress installations seem to be the drum that hackers like to hit on these days. It seems that many themes are also vulnerable as well. Anyway, as a starting point for fortifying a WP installation here are recommended file permissions settings for a WordPress installation on a Linux box. These commands will set 750 for all folders, 640 for files, and 600 for wp-config.php file. Sitting with a root/sudo access on a parent folder from a WP installation folder (assuming wpfolder here). | ||
Line 12: | Line 14: | ||
# sudo chmod 600 wpfolder/wp-config.php | # sudo chmod 600 wpfolder/wp-config.php | ||
</syntaxhighlight> | |||
== Backup process == | |||
* ''Last tested on Ubuntu 20.04.4 (2022/03/07)'' | |||
Backup database<syntaxhighlight lang="bash"> | |||
$ cd /www/blog-backup/ | |||
$ mysqldump --add-drop-table -u root -p mhanwp1 > 20220307-backup.sql | |||
</syntaxhighlight>Backup files<syntaxhighlight lang="bash"> | |||
$ tar zcvf 20220307.tar.gz /www/blog | |||
</syntaxhighlight> | </syntaxhighlight> |