Actions

Difference between revisions of "Security Checklist/Site Recovery"

From Joomla! Documentation

< Security Checklist
(Find exploit attempts using the *NIX shell)
(Know what steps to follow to recover your site)
Line 3: Line 3:
 
== Site Recovery ==
 
== Site Recovery ==
  
=== Know what steps to follow to recover your site ===
+
=== Follow a logical and rigorous recovery process ===
:Know the important steps to follow when your site has been compromised. Once you've been compromised, there are few shortcuts. '''([[Security_and_Performance_FAQs#Help.21_My_site.27s_been_compromised._Now_what.3F|FAQ]])'''
+
:Know the important steps to follow when your site has been compromised. Once you've gotten to this point, there are few shortcuts. '''([[Security_and_Performance_FAQs#Help.21_My_site.27s_been_compromised._Now_what.3F|FAQ]])'''
  
 
===Reset your administrator password===
 
===Reset your administrator password===

Revision as of 01:10, 29 October 2008

Contents

Site Recovery

Follow a logical and rigorous recovery process

Know the important steps to follow when your site has been compromised. Once you've gotten to this point, there are few shortcuts. (FAQ)

Reset your administrator password

(FAQ)

Find exploit attempts using the *NIX shell

(FAQ)

Get help the right way

If you believe your Web site was attacked, do not post in the Joomla! forums. If there is a vulnerability, publishing that information could put other Web sites at risk. Instead, report possible security vulnerabilities to the Joomla! Security Task Force.

Your Turn...

If you discover a bug in Joomla! core files, report it here.

Choose A Checklist

  1. Getting Started
  2. Hosting and Server Setup
  3. Testing and Development
  4. Joomla Setup
  5. Site Administration
  6. Site Recovery