BlockCracking will block a php script path that get's hacked, based on a few conditions, but should really help prevent things like that.
Say, for example, a bad script ends up in the /home/user/domains/domain.com/public_html/uploads/badscript.php, and starts to spam.
BlockCracking will start counting how many non-resolving destinations are being sent to per "path" (/home/.../uploads) and if more than "X" destinations fails in "Y" time, then the entire /home/..../uploads path is added to a block script.
This will block anything from that path to send anything, directly from the /usr/sbin/sendmail - command line - level. A path that is blocked cannot get anything in the queue at all.
Same effect when a DA account is at the limit by SB4.3, nothing gets into the queue at all (unlike older SB which only blocks it from leaving the server, after it's already in the queue)
I won't say "don't use blocking WP plugins", as more layers of security would be much better, but BlockCracking is going to be a fairly heavy-duty layer of protection.
------
I also highly recommend blocking
outbound port 25, and only allow it for "mail" and "root"... aka: exim always uses mail.
http://www.directadmin.com/features.php?id=1427
the block_ip/iptables already does this by default.. not sure if CSF does, but if not, add in those rules if you can.
I've noticed more reports of direct port 25 outbound sends, bypassing exim, and all of the exim tools, hence the need to only allow mail/root to use 25 out.
------
For a CB1 install, it is in theory possible to install SB/BC/ESF, but does require manual setup of various files, like the variables.conf, since they are assembled by CB2.
But SB 4 uses LMTP (can be changed back), but LMTP requires dovecot to be setup a certain way, which CB1 might not be doing (I can't recall 100%)
In any case, I highly recommend using CB2, as it does everything for you.
Unless you need php 5.2, you should be able to switch over to CB2 without much shock to your setup.. php can run however it ran, etc.. but you get all the new goodies
-------
For the chmod to 0, this is the related feature:
http://www.directadmin.com/features.php?id=1636
you'd set the value to "2"... but read the entire feature carefully.
I personally think it might be a bit heavy-handed, so use it lightly... and possibly set the limits on the higher-end of forgiveness. Up to you
Many layers of protection mean that no one layer needs to be ridiculous.
John