4,870 experience to go until the next level!
In case you were wondering, you earn Laracasts experience when you:
Earned once you have completed your first Laracasts lesson.
Earned once you have earned your first 1000 experience points.
Earned when you have been with Laracasts for 1 year.
Earned when you have been with Laracasts for 2 years.
Earned when you have been with Laracasts for 3 years.
Earned when you have been with Laracasts for 4 years.
Earned when you have been with Laracasts for 5 years.
Earned when at least one Laracasts series has been fully completed.
Earned after your first post on the Laracasts forum.
Earned once 100 Laracasts lessons have been completed.
Earned once you receive your first "Best Reply" award on the Laracasts forum.
Earned if you are a paying Laracasts subscriber.
Earned if you have a lifetime subscription to Laracasts.
Earned if you share a link to Laracasts on social media. Please email [email protected] with your username and post URL to be awarded this badge.
Earned once you have achieved 500 forum replies.
Earned once your experience points passes 100,000.
Earned once your experience points hits 10,000.
Earned once 1000 Laracasts lessons have been completed.
Earned once your "Best Reply" award count is 100 or more.
Earned once your experience points passes 1 million.
Earned once your experience points ranks in the top 50 of all Laracasts users.
Recently, I had developed a website using laravel 5.7 and its fully template engine (no dynamic backend) everything is layout based and pages constructed.
I am experiencing Japanese keyword hack, read this https://developers.google.com/web/fundamentals/security/hacked/fixing_the_japanese_keyword_hack
Cleaned up and followed the steps and Google Webmaster tools says no spam etc.,
but still, I see a lot of suspicious links from Google search
I am unable to get the server log as its not dedicated server or hosting is not sharing. also, I got another attach as per below details
The file can be found in your web space at the following location: ~/testxxx/vendor/phpunit/phpunit/src/Util/PHP/0x.php ``` Let me know what would be next step I must do? I am unable to share the URL here. Sorry.
I have used Laravel 5.7 and built a website (1000+ pages) and mainly used templating / routing, views. No backend or database related. Today, somebody tried to hack my website using "wp-config-sample.php" and it's uploaded in the public_html directory. How come it's possible without using FTP? Please advise how to avoid this kind of hacking.
I guess a hacker might be thinking my website is built with WordPress and put this file to hack. Luckily he can't do with Laravel?
I checked all the pages and site, it did not get damaged anything.