I could not find any useful Unix command line scanners that can identify WordPress hacked files and backdoors. So, I wrote my own. This is a little program written in PERL. Just unzip it, copy it to a suitable location on your Unix host (/usr/bin, for instance) and set permissions to 0755. MD5 Checksup of Zip file: f39cf6fd726930ae358a7c8b35b8cecc

This is a WordPress plugin that encrypts all WordPress User passwords in SHA512-Crypt format. This is much stronger than the standard WordPress mechanism. The password format is also Dovecot-compatible. This is PHP code originally written a year ago, then revamped in March 2017 due to a function collision with the WP-SpamSheild plugin. Just put this in your WordPress plugins folder, unzip, and activate. All subsequent password actions will invoke this module. Enjoy!  MD5 Checksum of Zip file: 51a2487fcd3c86a7384252668beeb0f6

This is a Unix shell script that makes it easy to replace strings within a file. Download the file, install it to a suitable location (like /usr/bin) and set the permissions to 0755. Use quotes around strings that have unusual or special characters. MD5 Checksum: 494e0b7842a9acff9c1128d6afe387e5

This is a tiny PERL script that takes an iPv4 argument and simply reverses the address (e.g. becomes Useful for manually testing RBL Black/White lists. Download the file, install it to a suitable location (like /usr/bin) and set the permissions to 0755. MD5 Checksum: 8a38d298cc89fe7af93cae83d952d848

This is a listing of the last 500 spamvertized URLs observed by the server. This list is automatically generated once a day at 11:00AM US Eastern Time. This information is suitable for RBLDNS systems but can be fed into the WordFence Comment filter as needed.

This is a listing of the last 500 IP addresses/address-ranges blocked due to spam.  This list is automatically generated once a data at 11:00AM US Eastern Time.  This information is suitable for use by RBLDNS systems.

This allows an Email client elsewhere on the Internet to Email this autoresponder, which then responds to the client with an Email describing the TLS/SSL transport security that was used.  To see it in use, simply send a blank Email to: autotest@jaredsec.com.

This Sieve script is compatible with Pigeonhole Sieve but should also work fine with CMU Sieve and others.  It does require that the standard “vacation-seconds” and “variables” extensions be activated.

After downloading, make sure to change the “subject“, “myaddress“, and “serverstring” variables at the top of the file.

This is a custom built FAX test sheet (in TIF format)  combining the functions of a few of the ITU test patterns.  It is useful for testing Gradients, Patterns, and Text Fonts.  Print out a couple of these sheets (fit to page) for test purposes.  

Make sure to send at least two pages when testing FAX machines.  Rather loose timing specifications associated with the End-Of-Page re-training sequences can play havoc with FAX machine compatibility; especially if there is emulation involved, like VoIP’s ITU Recommendation T.38.