I suppose you could yes, you would need to play a little with the configuration. When I say a little I mean you would have to literally rewrite allot of how wordpress work.

Also I have had my shared hosting accout hacked via a loop hole in WordPress, so I wouldn't advise you to use WordPress at all.

Yes, is is possible with wordpress. You can create custom pages with the funcitonality you want, through an extension.

I suppose you could yes, you would need to play a little with the configuration. When I say a little I mean you would have to literally rewrite allot of how wordpress work.

Also I have had my shared hosting accout hacked via a loop hole in WordPress, so I wouldn't advise you to use WordPress at all.

Josh, I wouldn't write wordpress off because it got hacked in shared hosting.

Shared hosting is usually more of the problem then the software installed on it.

Almost every account on shared hosting can be hacked, even if you use strict security measures.

ie: PHP usually runs as the same user on a single machine on shared hosting. So it can write to any file that it created, even on a different accounts.

If PHP can write to it, then anyone on the machine can write to it. It is the same for any running process on a shared host.

So when you're on a shared host, no matter how well you secure your site, if a single other site on that machine is vulnerable, your site is.

Comments
Thanks, too Good

Yes, is is possible with wordpress. You can create custom pages with the funcitonality you want, through an extension.

Josh, I wouldn't write wordpress off because it got hacked in shared hosting.

Shared hosting is usually more of the problem then the software installed on it.

Almost every account on shared hosting can be hacked, even if you use strict security measures.

ie: PHP usually runs as the same user on a single machine on shared hosting. So it can write to any file that it created, even on a different accounts.

If PHP can write to it, then anyone on the machine can write to it. It is the same for any running process on a shared host.

So when you're on a shared host, no matter how well you secure your site, if a single other site on that machine is vulnerable, your site is.

Maybe but the shared hosters technicians concluded that it was through wordpress that my websites were hacked. You can see the outcome from the following addresses:
http://jjcon.co.uk/
http://joshconnerty.co.cc/ // Hadn't even finsihed this one was a temporary domain :(
http://htmltutoronline.co.uk/
The actuall thing that caused these to stop functioning was that the index.php's (in every directory) had been cut short (about in 1/3 of the previous size) and had a hidden iframe added to it :(.

Maybe but the shared hosters technicians concluded that it was through wordpress that my websites were hacked. You can see the outcome from the following addresses:
http://jjcon.co.uk/
http://joshconnerty.co.cc/ // Hadn't even finsihed this one was a temporary domain :(
http://htmltutoronline.co.uk/
The actuall thing that caused these to stop functioning was that the index.php's (in every directory) had been cut short (about in 1/3 of the previous size) and had a hidden iframe added to it :(.

Thats the point. If you had wordpress on a non-shared server, it is much less likely to get hacked.

It is one of the most secure PHP scripts. It is the most deployed PHP script and thus has been hacked many times, and fixed many times making it very secure.

If it is deployed securely, and in a secure environment, and good security practices are followed is is almost impossible to hack.

A good hacker can hack 99% of all PHP scripts on the planet. It would probably take them less then 5 minutes to find a vulnerability in any given one. However, it would take them a year to hack a secure install of wordpress, if they ever do. (the numbers aren't real, its just an analogy).

The ability to hack an open source script like wordpress comes from thousands of hackers testing it for vulnerabilities daily. It only shows how secure it is, not the other way around.

This question has already been answered. Start a new discussion instead.