Actions

Difference between revisions of "Security"

From Joomla! Documentation

Line 1: Line 1:
 +
== Recommended Reading ==
 +
 +
# [[Security Checklist 1 - Getting Started|Getting Started]]
 +
# [[Security Checklist 2 - Hosting and Server Setup|Hosting and Server Setup]]
 +
# [[Security Checklist 3 - Testing and Development|Testing and Development]]
 +
# [[Security Checklist 4 - Joomla Setup|Joomla Setup]]
 +
# [[Security Checklist 5 - Site Administration|Site Administration]]
 +
# [[Security Checklist 6 - Site Recovery|Site Recovery]]
 +
# [[Security Checklist 7 | You have been Hacked]]
 +
 +
== More Information ==
 +
<small>List of articles that belong to the category "Security"</small>
 +
<DPL>
 +
noresultsheader=\n 
 +
category=Security
 +
</DPL>
 +
 
== REMEMBER ==
 
== REMEMBER ==
  

Revision as of 18:04, 26 September 2010

Recommended Reading

  1. Getting Started
  2. Hosting and Server Setup
  3. Testing and Development
  4. Joomla Setup
  5. Site Administration
  6. Site Recovery
  7. You have been Hacked

More Information

List of articles that belong to the category "Security"

REMEMBER

  1. There's no one right way! Due to the variety and complexity of modern web servers, security issues can't be resolved with simple, one-size-fits-all solutions. You, or someone you trust, must learn enough about your web server infrastructure to make valid security decisions.
  2. There's no substitute for experience! To secure your web site, you must gain real experience , or get experienced help from others.
  3. It's not as hard as it looks: The following checklist may seem intimidating, but you don't have to deal with all of it at once. As you become more familiar with GNU/Linux, Apache, MySQL, PHP, HTTP, and Joomla, you'll add refinements to your combination of security tactics. Security is a moving target, so today's expert might be tomorrow's victim. Good luck!...

Please read Joomla! Administrators Security Checklist for more information.

See all documents in the Security Category.