Edit File by line
/home/barbar84/www/wp-conte.../plugins/sujqvwi/AnonR/smanonr..../var/softacul.../monstra
File: .htaccess
#
[0] Fix | Delete
# This file is part of the Monstra.
[1] Fix | Delete
#
[2] Fix | Delete
# (c) Romanenko Sergey / Awilum <awilum@msn.com>
[3] Fix | Delete
#
[4] Fix | Delete
# For the full copyright and license information, please view the LICENSE
[5] Fix | Delete
# file that was distributed with this source code.
[6] Fix | Delete
#
[7] Fix | Delete
[8] Fix | Delete
# Set default charset utf-8
[9] Fix | Delete
AddDefaultCharset UTF-8
[10] Fix | Delete
[11] Fix | Delete
# PHP 5, Apache 1 and 2.
[12] Fix | Delete
<IfModule mod_php5.c>
[13] Fix | Delete
php_flag magic_quotes_gpc off
[14] Fix | Delete
php_flag magic_quotes_sybase off
[15] Fix | Delete
php_flag register_globals off
[16] Fix | Delete
</IfModule>
[17] Fix | Delete
[18] Fix | Delete
<IfModule mod_rewrite.c>
[19] Fix | Delete
RewriteEngine on
[20] Fix | Delete
[21] Fix | Delete
## Begin - Rewrite rules to block out some common exploits.
[22] Fix | Delete
# If you experience problems on your site block out the operations listed below
[23] Fix | Delete
# This attempts to block the most common type of exploit `attempts` to Monstra
[24] Fix | Delete
#
[25] Fix | Delete
# Block out any script trying to base64_encode data within the URL.
[26] Fix | Delete
RewriteCond %{QUERY_STRING} base64_encode[^(]*\([^)]*\) [OR]
[27] Fix | Delete
# Block out any script that includes a <script> tag in URL.
[28] Fix | Delete
RewriteCond %{QUERY_STRING} (<|%3C)([^s]*s)+cript.*(>|%3E) [NC,OR]
[29] Fix | Delete
# Block out any script trying to set a PHP GLOBALS variable via URL.
[30] Fix | Delete
RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR]
[31] Fix | Delete
# Block out any script trying to modify a _REQUEST variable via URL.
[32] Fix | Delete
RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2})
[33] Fix | Delete
# Return 403 Forbidden header and show the content of the root homepage
[34] Fix | Delete
RewriteRule .* index.php [F]
[35] Fix | Delete
#
[36] Fix | Delete
## End - Rewrite rules to block out some common exploits.
[37] Fix | Delete
[38] Fix | Delete
## Begin - Rewrite rules for Monstra
[39] Fix | Delete
RewriteBase [[relativeurl]]/
[40] Fix | Delete
RewriteCond %{REQUEST_FILENAME} !-f
[41] Fix | Delete
RewriteCond %{REQUEST_FILENAME} !-d
[42] Fix | Delete
RewriteRule ^(.*)$ index.php [QSA,L]
[43] Fix | Delete
## End - Rewrite rules for Monstra
[44] Fix | Delete
[45] Fix | Delete
## Begin - Rewrite rules for SEO improvements.
[46] Fix | Delete
# RewriteCond %{HTTP_HOST} ^www.example.org [NC]
[47] Fix | Delete
# RewriteRule ^(.*)$ http://example.org/$1 [R=301,L]
[48] Fix | Delete
# Redirect 301 /index http://example.org/
[49] Fix | Delete
## End - Rewrite rules for SEO improvements.
[50] Fix | Delete
[51] Fix | Delete
</IfModule>
[52] Fix | Delete
[53] Fix | Delete
# Prevent visitors from viewing files directly.
[54] Fix | Delete
<FilesMatch "(^#.*#|\.(md|txt|html|tpl|yml|yaml)|~)$">
[55] Fix | Delete
Order allow,deny
[56] Fix | Delete
Deny from all
[57] Fix | Delete
Satisfy All
[58] Fix | Delete
</FilesMatch>
[59] Fix | Delete
[60] Fix | Delete
# Allow read files.
[61] Fix | Delete
<Files robots.txt>
[62] Fix | Delete
Allow from all
[63] Fix | Delete
</Files>
[64] Fix | Delete
[65] Fix | Delete
# Don't show directory listings for URLs which map to a directory.
[66] Fix | Delete
Options -Indexes
[67] Fix | Delete
[68] Fix | Delete
It is recommended that you Edit text format, this type of Fix handles quite a lot in one request
Function