One of our SREs is cross-training in managing Wordpress sites.
She is mortified by the thought that somebody might manage a website without version control.
This is excellent.
One of our SREs is cross-training in managing Wordpress sites.
She is mortified by the thought that somebody might manage a website without version control.
This is excellent.
Seriously.
"Well, what happens when I fuck it up?"
"Well, then you fix it."
"So I should take a backup manually every time before I edit the website? x.x"
"Sure, or you could just fix it."
"💀 who would make such a thing? e.e"
@kaniini "index.html.1 index.html~ index.1.html index.html.o index.html.orig index.html.FINAL.original.2 index.html-latest.3"
@kaniini "Here you go! It's the access to our FTP server. Hope you enjoy using Filezilla to upload new changes by hand!"
@deadsuperhero yep, basically.
@kaniini I used to do everything that way, and thought it was the easiest thing in the world.
Then I learned how to use SSH and git, and I never looked back.
@deadsuperhero yes, unfortunately wordpress isn't very compatible with SSH and git ;)
@kaniini *shudders*
I'm always surprised and mildly annoyed by the amount of businesses who just use a Wordpress instance for their entire website. For a while, I'd look at a website, then navigate to /wp-login.php just to see if they were running it.
Pro tip: almost every local Midwestern business not located in a major city does this.
@lain But if I call the CW Wordpress, you'll still get triggered.
I know that I do.
Oh, it gets better than that.
For this particular business, our content team doesn't ever bother to update the plugins that come with the various themes they purchase.
So basically 2 to 3 times a day we get a nagios alert that tells us that one of the wordpress servers has been hacked *again* and is trying it's best to sending out spam *again*.
Thankfully all the mail those machines send go to /dev/null in reality.
But recently, we had an instance where somebody hacked one of the sites by hand and then went and hacked every other site on the server by checking what other domains had the same DNS as the first site they hacked.
So literally our SRE team had to disinfect 500 sites in one go.
@deadsuperhero preaching to the choir, man. but there's not really anything that has a friendly UI that does 'the right thing' like that.
Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.
All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.