Actions

Difference between revisions of "Security Checklist"

From Joomla! Documentation

m (moving up navigation includes)
m (continuing to improve)
Line 27: Line 27:
 
}}
 
}}
 
}}</includeonly>
 
}}</includeonly>
<noinclude>{{Navbox
+
<noinclude>
 +
Internet security is a vast and fast-moving topic. No one set of rules can cover all possible situations. These checklists will point you in the right direction. At a minimum they will do two things:
 +
 
 +
# Inform you of typical security issues
 +
# Point you in the right direction for more information
 +
 
 +
 
 +
{{Navbox
 
|state=off
 
|state=off
 
|navbar=off
 
|navbar=off
Line 43: Line 50:
 
*[[Security Checklist/Site Recovery|Site Recovery]]
 
*[[Security Checklist/Site Recovery|Site Recovery]]
 
*[[Security Checklist/You have been hacked or defaced|You have been hacked or defaced]]
 
*[[Security Checklist/You have been hacked or defaced|You have been hacked or defaced]]
 +
|list2=
 +
'''Please also take a look at the list of [[Vulnerable Extensions List|Vulnerable Extensions]]'''.
 
|list1style=padding-left:10px; font-size:1.2em;
 
|list1style=padding-left:10px; font-size:1.2em;
}}</noinclude>
+
|list2style=padding:10px; font-size:1.2em;
 +
}}
 +
 
 +
[[Category:Security Checklist]]
 +
</noinclude>

Revision as of 16:52, 13 October 2012


Internet security is a vast and fast-moving topic. No one set of rules can cover all possible situations. These checklists will point you in the right direction. At a minimum they will do two things:

  1. Inform you of typical security issues
  2. Point you in the right direction for more information