Wordfence forensics: mining wp_wfhits and wp_wfissues to reconstruct a breach timeline

Top-down view of two detectives examining black-and-white photos and fingerprint cards on a desk — visual metaphor for piecing together a breach timeline from log evidence (photo: RDNE / Pexels)

If you’re cleaning up a WordPress compromise and the site has Wordfence installed, you have more forensic data than you think. Even on the free plan, Wordfence quietly logs every blocked request, every plugin-vulnerability advisory, every flagged file, and every …

Jellyfin self-hosted media server: setup, Intel QuickSync hardware transcoding, and the Roku and Apple TV client situation in 2026

Plex used to be the answer for “I have a hard drive full of movies and want to watch them on my TV.” Then Plex started showing ads, requiring sign-in, gating features behind subscriptions, and breaking the offline path. Jellyfin …