Warning: Hotlinking can be dangerous for your website

Hotlinking, SEO & The Dangers

One critical thing that is covered in WordPress discipline is that of speeding up the blog load time. You need to understand that internet readers are impatient jumpers. They prefer to visit websites which load quickly and hence; you need to ensure that your blog has faster load time compared to your competitors. If not, you are in trouble! This is because your reader will then jump on to the website or blog of your competitor. Is that what you want? Not really! Here is a list of topics which are covered in training sessions of WordPress. These are the technical aspects of WordPress, and hence, you must always take them seriously and understand each concept correctly!

Prevention of Hotlinks: Hotlink is nothing other than bandwidth theft. Some spammers will link their articles to the images present in your blog. If this occurs, you will find that your server slows down, and you blog loads slowly. Hot links can be prevented from root .htaccess file. There is a specific code which needs to be placed in the archive. How to place that and where to place that is taught in the training.

The code is:

#disable hotlinking of images with forbidden or custom image option

RewriteEngine on

RewriteCond %{HTTP_REFERER} !^$

RewriteCond %{HTTP_REFERER} !^http(s)?://(www\.)?wpbeginner.com [NC]

RewriteCond %{HTTP_REFERER} !^http(s)?://(www\.)?google.com [NC]

RewriteCond %{HTTP_REFERER} !^http(s)?://(www\.)?feeds2.feedburner.com/wpbeginner [NC]

RewriteRule \.(gif|png|jpeg|jpg)$ – [NC,F,L]

You also need to learn about the method of following your feeds so that your feed readers can see the images.

Web Hosting: WordPress training also teaches how to select the correct web server. Just to save some bucks if you choose a weak server, you will end up having slower load time for your blog. You need to select a host which has active servers so that the loading speed of your blog increases.

Image Size: Bigger the size of the image, the slower is the load time for your blog. Training sessions for WordPress help you to explain how to reduce the image size. It also teaches what should be the ideal size of the pictures. There exist a few plugins which can assist you to get lighter image files. How to use these plugins is also taught in the training sessions.

Inactive Plugins: Installing unnecessary plugins can significantly reduce the speed of your blog. Ideally, you should not have more than 15 plugins installed. The training sessions help you to learn how to identify and uninstall the plugins which are not necessary.

Post Splitting: This is a very simple technique but requires some technical knowledge. If you split your long posts into several parts and create separate pages, you will find that the load time of your blog is increased. How to cut the posts and create new pages is explained in the training sessions. This method helps to increase the number of page views.

WordPress training can help you to understand the basics and the core of the blogging tool and assist you to attain better page rank and attract targeted audience.


What are the various web browser features and associated security risk hazards?

It becomes necessary to understand the features of a web browser and the associated risks because cyber miscreants consistently use it to advance their activities and challenge PC security. They find it easy to infect your PC by injecting viruses and malware taking the route of web browsers, and they do so by exploiting the vulnerabilities found therein.

Virus and malware authors focus on targeting the features of web browser that are mainly responsible for such security incidents. Below discussed are some of the features that can be exploited by cyber perpetrators. By understanding the functionalities of these functions, you can understand how they can be used to compromise the security of your PC.


If you are a frequent internet user, then you must have heard the term cookies. Cookies exist as files located on your PC and store data related to websites you browse. Information associated with the websites visited by the user and credentials for accessing the site are saved in the Cookies files. Cookies can be read only by those sites that have created the cookie. However, session cookies are removed when the browser is closed, but persistent cookies remain on the PC until it is removed manually or they reach their expiration date. Since Cookies can provide a lot of information related to browsing behavior and history, they are often targeted by viruses and malware authors.


JavaScript is a scripting language which is used by developers for making websites more and more interactive. It is an important feature of the web browser that carries specifications using which certain features such as accessing local files can be restricted.

Cross-Site Scripting

Cross-Site Scripting which is referred as XSS is a website vulnerability that allows an attacker to enhance its trust relationship with the site. It is not always caused by a failure in the web browser. To know more about the XSS vulnerabilities you can search for the vulnerability notes database and cross-site scripting vulnerabilities.

Cross-Zone and Cross-Domain Vulnerabilities

The majority of the web browsers employ certain security standards to prevent website scripts from accessing data in a different domain. These security features are meant to address the cross-zone and cross-domain vulnerabilities that can help virus authors access private information on the website.

Detection Evasion

Different antivirus programs, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems protect your PC by looking for specific content patterns. Once they find out any unknown pattern they initiate the protection procedure to safeguard the user. But these protective systems can be bypassed by the dynamic nature of programming languages and script in web pages.

Above discussed are the various web browser features and the associated risks. Among these, ActiveX, JavaScirpt, and VBScript are majorly responsible for the majority of security flaws in a browser. The best way of averting such security risks is to disable these browser features unless they are specifically required.