Flamenet is a retro internet portal that recreates the look, feel, and spirit of the early web — specifically the golden era of Y2K portals like Flamenet, Yahoo, Excite, and AOL. Dense navigation, scrolling headlines, a directory of links, community forums, instant messaging, auction listings, and a games arcade: everything you remember from staying online past midnight on a 56k modem.
It is not a museum. It is a living, working community built on modern infrastructure but styled and organized the way the web felt in October 2001. Sign up, connect your AIM client, post in the forum, browse the directory, and bid on something in the listings. That's Flamenet.
Flamenet runs automated security scans every 24 hours and gives administrators tools to run each scan manually at any time. Here is what is checked and how.
| Check | What it scans | How | Frequency |
|---|---|---|---|
| Core integrity | Every core file | MD5 checksum compared against the official WordPress.org list for the installed version. Modified or missing core files are flagged and can be repaired in one click. | Daily |
| Malware patterns | All PHP and JS files in plugins and themes | 16 regex patterns covering common backdoor techniques: obfuscated eval(), shell execution functions, variable function calls fed by user input, hidden iframes, and long hex- or base64-encoded payloads. |
Daily |
| Uploads directory | Every uploaded file | Any PHP file found in the uploads directory is flagged as critical — PHP files have no legitimate reason to be there. | Daily |
| Post content | 500 most recent published posts and 500 approved comments | Scans stored content for injected scripts, javascript: URIs, eval(), document.write(), and base64_decode(). |
Daily |
| S3 file scan | Every user-uploaded file stored in S3 | Files are streamed to a temporary location in 1 MB chunks (no file-size limit) and checked against the same 16 malware patterns plus 4 HTML-injection patterns: script tags, JavaScript protocol URIs, inline event handlers, and iframes. Pure image, audio, and video files are skipped. The file owner is notified by private message if a match is found. | Daily |
| Have I Been Pwned — email & username | Every registered user’s email address and username | Checked against the Have I Been Pwned breach database. If an account is found in a known breach, the user is notified by private message listing the affected services. | Daily |
| Have I Been Pwned — password | Password used at sign-in | Uses the HIBP k-anonymity API: only the first 5 characters of a SHA-1 hash are sent — the plain-text password never leaves the server. If the password has appeared in a public breach database, the user is notified immediately to change it. | At login |
Detection is pattern-based and does not use a traditional antivirus engine. Sufficiently obfuscated code may not match known patterns. Results are reviewed by administrators and can be dismissed individually if a finding is a false positive.
We are a small team and we read every message. Use the address that matches your topic:
You can also find answers to common questions in the Knowledge Base, read our Privacy Policy, or review the Terms of Use.