WordPress 4.4

WordPress 4.4 was recently released, and as always, we’ve updated our WordPress one-click installer to automatically install the latest version for new WordPress sites.

If you’ve previously installed an older version of WordPress, you should update it from within your WordPress Dashboard.

PHP 7.0.0 and 5.6.16

The PHP developers recently released PHP version 7.0.0, as well as an update to the 5.6 series, version 5.6.16. We’ve upgraded PHP on our servers as a result.

The official release of PHP 7 means we’ll start encouraging customers to use it (as long as they use modern scripts like current versions of WordPress). It’s almost twice as fast as old versions of PHP. Yes, really: Twice as fast. We’re using it ourselves on this blog.

If you’d like your WordPress or other PHP-based site to seem snappier, or be able to handle twice as many visitors per second, you can easily do so:

  1. Login to our My Account control panel
  2. Click PHP Settings
  3. Click PHP 7.0 series
  4. Click Save Settings

Then test your site to make sure it works properly. If it does: Great, you’ve just made your site much faster! If it doesn’t, it’s probably because you’re using older scripts that haven’t yet been updated, and you can simply set PHP back to an earlier version for now. We recommend that you always use the latest version that works properly with your scripts.

As always, if you have any trouble, don’t hesitate to contact us.

Preventing PHP scripts from running in /wp-content/uploads

We write a lot about how out of date WordPress plugins or themes can cause your site to get “hacked” due to security bugs.

Interestingly, many of these bugs have a near-identical flaw: They intentionally allow strangers to upload files to your site (intending to allow image uploads and so on), but they don’t sufficiently screen out malicious script files. The bugs allow a malicious PHP script somewhere under the site’s “/wp-content/uploads” directory, then the “hacker” simply runs that script in a web browser.

To help our customers, we’re doing something to minimize the impact of these security vulnerabilities: By default, we’re now blocking PHP scripts from running in “/wp-content/uploads”.

This will improve security because very few sites use this feature legitimately (and none should do so, really; relying on being able to run uploaded PHP scripts without moving them to a safe location is a security risk). Disabling PHP scripts in this directory is recommended by well-known WordPress security companies like Acunetix and Sucuri.

Read the rest of this entry »

PHP 7.0.0RC7 experimentally available

As we mentioned in a previous post, our customers can now test the next major update to PHP, version 7.0, which is almost twice as fast as the current PHP 5.6. (There is no PHP version 6: That project was abandoned by the PHP authors.)

Today we updated the test version on our servers from 7.0.0RC6 to the latest 7.0.0RC7.

Read the rest of this entry »

PHP 5.6.15

The PHP developers recently released version 5.6.15 that fixes several bugs. We’ve upgraded PHP 5.6 on our servers as a result.

Read the rest of this entry »

PHP 7.0.0RC6 experimentally available

As we mentioned in a previous post, our customers can now test the next major update to PHP, version 7.0, which is almost twice as fast as the current PHP 5.6. (There is no PHP version 6: That project was abandoned by the PHP authors.)

Today we updated the test version on our servers from 7.0.0RC5 to the latest 7.0.0RC6. This updated version also includes support for the ImageMagick extension, making it functionally complete.

Read the rest of this entry »

Slight change to compressed e-mail filenames

This post describes a small technical change to the way e-mail is stored on our servers. The change is unlikely to affect anyone and does not affect normal e-mail access at all — we’re documenting it just in case any customer is doing something very unusual.

Last year, we started compressing some stored mail on our servers, and our page about mail storage mentioned that compressed mail files would have a capital “Z” in the filename.

Our servers now compress all new mail, and as a side-effect of that change, compressed files won’t always have the “Z” in the filename. The page has been updated to reflect that.

As it says, we never recommend accessing the raw mail storage files anyway: All mail access should always be done through standard SMTP, POP or IMAP protocols. Doing things that way will ensure that changes the mail storage format won’t affect you.

Protection against a critical Joomla security bug

The authors of the Joomla software announced today that every version of Joomla between 3.2.0 and 3.4.4 has a critical security bug that allows hackers to take over a site (the bug is known as “CVE-2015-7857”).

The best solution for Joomla users is to update to version 3.4.5 immediately. However, we’ve also added a rule to our servers to protect our customers until they do this. The rule should ensure that if you use our hosting service, “hackers” won’t be able to take advantage of this bug.

Read the rest of this entry »

PHP 7.0.0RC5 experimentally available

The PHP developers are about to release a major update to PHP, version 7.0.

The main new feature (as far as most of our customers will be concerned) is vastly improved performance. Our testing shows it can run WordPress sites around twice as quickly, lowering the site’s CPU resource usage significantly. Sites that use it will be able to handle close to twice as many visitors per second.

Although a “stable” version of PHP 7 has not yet officially been released, a “release candidate” preview version is available, and we’ve installed that on our servers for customers who want to test it.

Read the rest of this entry »

PHP 5.5.30 and 5.6.14

The PHP developers recently released versions 5.5.30 and 5.6.14 that fix several bugs. We’ve upgraded PHP 5.5 and 5.6 on our servers as a result.

Read the rest of this entry »