Connect with us

.htaccess File

How To Fix WordPress Old URL Redirecting to New URL?

WordPress will do 301 redirects for post’s URL or Slug change. changing a post’s slug in WordPress will automatically create 301 redirects from the old URL to the new URL. It has a suitable feature of recollecting the old URL and 301 redirecting to the new URL.




WordPress automatically 301 redirections

Fixing of WordPress Old URL Redirecting to New URL when a WordPress post’s slug changes can follow the below steps.

1. Does WordPress automatically 301 redirects if you change a post URL slug?

WordPress will do 301 redirects for the post’s URL or Slug change. Changing a post’s slug in WordPress will automatically create 301 redirects from the old URL to the new URL. WordPress Old URL Redirecting to New URL has been doing for default post type called post.

Google loves short URLs. SEO specialist changes long URLs to shot URLs for SEO purpose. If you built backlinks by using old URL the URLs are broken it is already indexed in search engines it will cause 404 error and when we change the old URL will show 404 error this why WordPress does automatically 301 redirects old URLs to new URLs this why WordPress is SEO friendly.

WordPress has this suitable feature of recollecting the old URL and 301 redirecting to the new URL so that your links aren’t broken, and backlinks are work fine due to this feature.

This is a cool and trendy feature in WordPress, but it can cause frustration because there are no options in the WordPress dashboard. The only way to remove these old entries is from your WordPress database directly.

2. Why is it important to redirect URLs for SEO?

The role of the 301 redirect in SEO is to preserve your build up rankings and passes of the page authority from an old URL to a new URL. 301 redirections will pass as much value from the old URLs to the new URLs as possible.

If you don’t do 301 redirections may be seen as a soft 404 error page, and search engines won’t pass the authority and traffic-related over from the old URL.

3. Where to implement the redirections?

301 redirections is a developer’s task, ask your developers to do it. In WordPress, we can do through plugins and in server config files like a .htaccess file. Avoid chained redirections; it will cause frustration to users as well as bots. In this situation, your browser will do chained redirections; we can observe the page will not be open; it does redirections continuously.

How To Fix or Turn off or remove WordPress Automatic Old URL Redirecting to New URL when a post’s URL or slug changes?

I don’t recommend changing URL slug before writing a blog we should take care of proper URL slug for posts or pages.

First I had been created a post and published, after few days I was changed my post slug URL that time I have observed when I am updating my new slug it is working fine after being open my old post URL into the browser it is an automatic redirect to my original post URL.

I search on WordPress Codex i found an function called (‘wp_check_for_changed_slugs()’) and its post meta field (‘_wp_old_slug’).

The post meta field (‘_wp_old_slug’) save old slug when changed slugs for published posts.

WordPress has a great feature of remembering the old URL slugs and stored into the database. WordPress Core default added post meta field (‘_wp_old_slug’) for storing old URL slugs for that post.

The most logical use of this function is redirecting changed posts so that those that linked to a modified post will be redirected to the new post.

[php]<?php wp_check_for_changed_slugs( $post_id ); ?>[/php]

The above function returns the changed post slugs. $post_id means Post ID.

It is used to check the changed post slugs for published posts.

The below steps we can follow to fix or Turn off or remove WordPress Automatic Old URL Redirecting to New URL when a post’s URL or slug changes.

This option is not available on WordPress dashboard we need to perform this on WordPress database.

Follow the below steps on how we can fix or Turn off or remove WordPress Automatic Old URL Redirecting to New URL when a post’s URL or slug changes.

Before doing this process, First, take a backup of your WordPress database file first.

4. Steps to remove or fix WordPress Automatic Old URL Redirecting to New URL.

1. Login to your Cpanel and open database via phpMyAdmin.


2. In phpMyAdmin click on your WordPress database file.

WordPress MySQL Database

PhpMyAdmin is a most popular and powerful web-based user interface for administering MySQL or MariaDB databases. It is open source web tool, written in Hypertext Preprocessor (PHP). It is one of the better web tools available for working with MySQL or MariaDB databases. It is used to handle the MySQL CRUD operations easily.

MySQL is one of the most popular open source SQL (Structured Query Language) database implementation. WordPress requires a MySQL Database to store all blog related information, including posts, comments, metadata, custom fields, and other information.

3. Click the search tab on phpMyAdmin menu bar.

MySQL Database Tables

4. Search a post meta field value called _wp_old_slug and select all inside tables and then hit the go button.

MySQL Database Tables Search

5. It will show the search criteria for _wp_old_slug value matches.

search criteria for _wp_old_slug value matches

6. We can observe 19 matches in the post meta table in the above screenshot with browse and delete options. Click on the browse option and view the table fields within details.

browse and delete options in MySQL DB

7. We can see all the old slugs details in the below screenshot.

old slugs details meta fields

8. Check all tables at the left side bottom of the tables, as shown in the screenshot, and hit the delete option; all the tables should be deleted.

select all fields in a mysql DB table

The below screenshot shows the Single Database field delete alert with an example.

Single table delete alert example

Means no more old slug URLs in the database the problem with the WordPress Automatic Old URL Redirecting to New URL when a post’s URL or slug changes are fixed or removed.

If you want to edit or save a new URL instead of an old URL, you can follow all steps that don’t delete, and you can edit each field and update the new URL or slug as per below screenshot.

Editing of _wp_old_slug field

Helpful Resources:

1. Top 20 Free Yoast SEO Alternatives & Competitors for WordPress Websites

2. WordPress Development Tips to Supercharge Your Projects

3. 16 Best Free SEO WordPress plugins for your Blogs & websites

4. 16 Best (free) AMP – (Accelerated Mobile Pages) WordPress Plugins

5. Top 50 Best (Free) WordPress WooCommerce Plugins for your storefront

6. JavaScript SEO: Server Side Rendering and Client Side Rendering

We are an Instructor's, Modern Full Stack Web Application Developers, Freelancers, Tech Bloggers, and Technical SEO Experts. We deliver a rich set of software applications for your business needs.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

.htaccess File

HTTP vs. HTTPS: How to Select the Best Option for Your Website

HTTP vs. HTTPS: An HTTP is a HyperText Transfer Protocol, whereas a WWW is a World Wide Web that connects clients and servers.




HTTP vs. HTTPS for Your Website

Can you even imagine that a single letter could make much difference with your website ranking? Confused by what I am talking about? Straightforward, it is the HyperText Transfer Protocol.

1. What so important about HTTP?

If you have noticed since 2014, Google announced that websites that hold the HTTPS on it would obtain a hike in its search ranking. You might have wondered, what would this “S” does with the website’s ranking. I would say it has a lot more than you think.

In today’s post, let us investigate HTTP vs. HTTPS and what is the best option to select the HTTPS for your website. Would you be interested to know more about it?

Let’s get started!!!

HTTP vs. HTTPS How to Select the Best Option for Your Website

2. What is HTTP?

An HTTP is a HyperText Transfer Protocol, whereas a WWW is a World Wide Web that connects clients and servers. Now clubbing these two techniques together makes some sense. It is done by establishing a communication between the client computers and web servers by sending an HTTP request and receiving an HTTP response on the other end.

An HTTP being a stateless protocol does not save or store any of the previous web sessions. As the protocol is stateless, there is less usage of data; therefore, increasing data transfer speed. There are several other benefits of using HTTP. A few of them are as follows,

  • Helps in accessing HTML pages
  • Websites without confidential data use HTTP to access
  • Functional and efficient

3. What is HTTPS?

The HTTPS (HyperText Transfer Protocol Secure) security is the essential thing that is very much needed these days. In recent times we face a lot of security breaches, especially when it comes to eCommerce websites, there is a lot of complaints from the customers that they have issues, or their money is stolen at the transaction. All these are referred to as security threats. In order to avoid such discrepancies, the HTTPS was introduced to ensure security among users.


4. Select the best SSL Certificate for your website

Before we could move into choosing the right SSL certificate for your website, let us investigate the types of SSL certificates that exist.

The types of SSL certificates are as follows,

  • Single Domain SSL Certificate
  • Multi-domain SSL Certificate
  • Wildcard SSL Certificate
  • Organizational Validation SSL Certificate
  • The extended Validation SSL certificate

5. The Extended Validation SSL certificate (EV-SSL)

The Extended Validation SSL Certificate promises you with the highest level of security to your website and the most top validation done by a Certificate authority. The brand that involves the certificate will have to undergo a rigorous background check and various confirmation process in order to get it validated.

To be more authentic, EV-SSL is the best form of security and a cost-effective certificate that can be added to your website.

Benefits of having an EV-SSL Certificate:

  • EV SSL is intended to obviously convey the dependability of the site to its users by offering a green bar that assures client certainty.
  • EV decreases cart abandonment and improves client conversions. You get higher revenue per exchange and higher lifetime client esteem.
  • Demonstrates your site has passed similar security checks as the other significant sites.
  • It isn’t merely the best SSL certificate for WordPress and the best SSL certificate for internet business yet for every single other sort of site.
  • Most elevated SSL security levels – 2048-bit digital signatures all through the whole certificate bind and up to 256-bit encryption as standard.

6. Organizational Validated SSL Certificate

Organizational Validated SSL certificate ensures high-level web security. The OV-SSL certificate adds up validation of the complete business details, which includes name, address, domain name, and any other sensitive information of the website holder.

The installation of an OV-SSL certificate to your domain shows a green padlock symbol at the front. The certificate provides warranty assurance and 100% security with secure data encryption.

Especially when it comes to eCommerce websites, a customer can be hassle-free on noticing the HTTPS on the address bar as it ensures the sign of security to its customers.


7. Domain Validated SSL Certificate

A domain validated SSL does not authenticate or validate business information. The certificate still ensures high-level security, but low level of validation compared to EV and OV SSL.

8. Single domain SSL Certificate

The single SSL certificate allows a customer to secure only a single domain/sub-domain on one single certificate. The single-domain SSL certificate ensures strong security against data theft and security breaches.

A single-domain SSL certificate can be used to protect a single domain, individual sub-domain, hostname.

There are other cheap SSL certificates that can help you protect your website from security breaches. They are as follows,

  • Multi-domain SSL certificate
  • Wildcard SSL certificate
  • Unified Communications certificate

9. Why do you need an SSL certificate for your website?

On the off chance, you need to demonstrate your character and authenticity to your site users; at that point, you certainly need to add an SSL certificate to your site. SSL security is, for the most part, used to protect clients’ data. In this way, they are must for website pages if,

  • You’re selling something on the web (you are assuming acknowledgment card, standardized savings numbers, and some other individual information during the request procedure).
  • You are enabling clients to make accounts with your organization.
  • Your site is encouraging login and enrollment options.
  • You are accepting clients’ data, reports, and photographs by means of the form(s).
  • You give secure administrations like web banking and online email (where complete protection is required).

10. Wrap up:

The most valuable thing you need to know about website security is portrayed in this post. This helps you to have a better understanding of HTTP, HTTPS, and the importance of having an SSL certificate for your website and your online business.

The different types of SSL certificates are mentioned above for your convenience that you may choose the right one for your business. Finding the cheapest SSL certificate and an authentic one would never be a typical task for you. Install the best certificate for your online business and skyrocket your business with trust and authenticity.

Continue Reading

.htaccess File

Why Are Email Attacks Using Cloud Services Increasing Significantly?

Why Are Email Attacks Using Cloud Services Increasing Significantly?. Cybercriminals are increasingly targeting cloud computing systems & hackers were abusing cloud services.




Email Attacks Using Cloud Services

In the Information Age, the ever-growing reliance that enterprises have on technologies such as cloud computing comes as no surprise. Taking into account the fact that the digital world revolves around data, with some cybersecurity specialists going as far as to term data as the “currency” of the modern age- it becomes obvious why companies would want to protect their valuable data through the integration of such cloud-based services.

Unfortunately, however, as idealistic as it may sound, cloud computing is in no way perfect. Moreover, the current conditions of the ever-evolving threat landscape dictate that the possibility of an enterprise being breached is mostly a matter of ‘when’ rather than ‘if’- which shines a light on the dire need for better cybersecurity in the IT world, and the growing sophistication with which hackers launch attacks.

And to top it all off, FireEye’s recent email threat update that paints a gruesome picture and highlights the increase in the number of email attacks on cloud services over the course of the past months. Not only does this revelation bear witness to the damage a single compromised email can wreak, but it also provides an honest depiction of the more negative sides of cloud computing use.

Email Attacks Using Cloud Services Increasing Significantly

In order to bring our readers up to scale on the prevalence of email attacks, and the new connection email-based attacks share with cloud computing- we’ve compiled an article that informs readers about the email analysis conducted by FireEye, along with giving the possible reasons for the recent spike in these attacks.

1. What Did FireEye’s Email Threat Analysis Reveal?

Right off the bat, in order to effectively determine the recent pattern of threats and vulnerabilities being propagated through emails, FireEye analyzed a whopping number of over 2.2 billion emails sent in the month of April to June 2019.

The revelations brought forth by the analysis of the emails can subsequently be divided into three subsections, that highlight the general theme behind the email threats facing enterprises, which consist of the following:

2. Cybercriminals are increasingly targeting cloud computing systems

Perhaps the most alarming discovery made by the threat analysis- it was revealed that a growing number of cybercriminals are targeting cloud computing software. It was further brought into notice that threat agents have started to rely on cloud-based services, as the vector that helps them propagate and launch phishing attacks on an organization’s network.

The analyzed emails further revealed that the most prevalent methods through which hackers were abusing cloud services, including embedding phishing URLs in file-sharing platforms, along with hosting several phishing pages that appeared to be legitimate.

3. Microsoft products become the most targeted victims in phishing attacks

As per the case with most phishing attacks, cybercriminals appear to mimic popular brands and services, in an attempt to get their potential victims to click on the malicious links. Usually, hackers pretend to be a well-known contact or a trusted organization, and the analysis done by FireEye bears witness to this.

The analysis of emails done by FireEye brought into light that the most commonly abused brand utilized in phishing attacks is none other than Microsoft. The analysis report revealed that the use of Office 365 and other Microsoft products were the most utilized conduits in phishing attacks, with their use has increased by a staggering 181%.

Cloud Computing Services

4. The entertainment and media industry surpasses financial services as the most targeted vertical

Another highly valuable piece of information highlighted by the analysis conducted by FireEye revealed that when compared to the previous study done- it was revealed that the entertainment, media, and vertical hospitality industries had taken the top spot for being the most target market for hackers.

It should also be mentioned that the previous spot belonged to the vertical industry of financial services, whereas other highly targeted industries include service providers, local and central governments, along with insurance and consulting companies.

5. Why Has The Phenomenon Of Email Attacks Targeted Cloud-Based Services Become So Prevalent?

Although the discoveries made by FireEye’s email threat analysis are enough to knock some sense into the most laid back individual- the revelation regarding the prevalence of email attacks on cloud computing system raises a lot of important questions, particularly as far as the “why” behind the situation is concerned.

The apparent reason that comes into mind is the popularity of cloud computing systems within modern enterprises- as more and more enterprises continue to ride the wave of digitization, accounting for the global public cloud computing market to reach a whopping $258 billion by 2019- it is quite understandable why hackers might want in on the share.

As an increasing number of enterprises store sensitive data on cloud storage systems, hackers are going to look for sophisticated methods to breach into this storage havens, since there is a monumental amount of money to be leveraged from these attacks.

Another critical, yet highly unprecedented reason that explains the rise in these email attacks targeting cloud-based services is the fact that a cloud computing system has many exploitable vulnerabilities present. Some cybersecurity specialists might even go as far as to say that the integration of cloud computing and its related products serves as an open invitation to hackers to breach into an enterprise’s network.

In addition to being pretty easy to hack into, some common vulnerabilities present within cloud-based computing systems include compliance issues, along with fraudulent authorization, hacked interfaces, and APIs, amongst many others.

6. How Do Hackers Manage To Evade Detection?

Fortunately for the cybersecurity world, however, FireEye’s analysis went on to elaborate on some of the most common tactics employed by cyber criminals that enable them to surpass network scanners, without being detected.

Some of the most common techniques through which hackers are able to evade detection, and subsequently, the consequences of the crimes they’ve committed include the following:

  • Hiding a malicious URL, by adding other seemingly ordinary URLs.
  • Impersonating a trusted actor, in order to gain the victim’s trust.
  • Providing users access to malicious sites and stealing their login credentials.
  • Relying on captcha-based methods to prevent detection.

7. Conclusion

As the threats facing enterprises continue to grow in sophistication, one of the most significant steps that enterprises can take to promote the principles of cybersecurity is to stay in the loop regarding the recent developments in the world of cybercrime. Having said that, as the integration of cloud-based services become more and more widespread within an organization’s security infrastructure, enterprises need to focus on formulating responses that cater to these threats.

Helpful Resources:

1. Why is Cybersecurity Important For Enterprises?

2. 5 Website Security Tips Every Employee Should Know

3. Get VPS Hosting For Your Websites For Better Results

4. Top Ten Blockchain Applications That Are Transforming Industries

5. 6 Best Wireless Security Cameras You Can Get

6. How to Protect WebSites Against Attackers or Hackers by using “X-Security Headers”

Continue Reading


Copyright © 2021 | All Rights Reserved by TwinzTech