I’m picking this is because I fundamentally fail to understand this Brute Force Protection code.s full purpose. I tried to enter the password to the page and got a 403 error for my sins, and this error message in my log:
[403 GET / HEAD Request: April 15, 2014 12:35 am] Event Code: BFHS - Blocked/Forbidden Hacker or Spammer Solution: N/A - Hacker/Spammer Blocked/Forbidden REMOTE_ADDR: 202.50.252.53 Host Name: 202.50.252.53 SERVER_PROTOCOL: HTTP/1.1 HTTP_CLIENT_IP: HTTP_FORWARDED: HTTP_X_FORWARDED_FOR: HTTP_X_CLUSTER_CLIENT_IP: REQUEST_METHOD: GET HTTP_REFERER: http://windtrainer.co.nz/signup/ REQUEST_URI: /wp-login.php?action=postpass QUERY_STRING: HTTP_USER_AGENT: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/537.75.14
Am I to assume that having this code will prevent me from using password protected pages? I have removed it now.