From Joomla! Documentation
Revision as of 22:53, 11 May 2011 by Chris Davenport
- Security Checklist 1 - Getting Started
- Security Checklist 2 - Hosting and Server Setup
- Security Checklist 3 - Testing and Development
- Security Checklist 4 - Joomla Setup
- Security Checklist 5 - Site Administration
- Security Checklist 6 - Site Recovery
- Security Checklist 7 - You have been Hacked
List of articles that belong to the category "Security"
- Backup Basics for a Joomla! Web Site
- Backup Basics for a Joomla! Web Site/en
- Backup Basics for a Joomla! Web Site/pt-br
- Delete Installation folder
- Delete Installation folder/en
- J2.5:Global configuration
- J3.x:Global configuration
- J3.x:Global configuration/en
- J3.x:Global configuration/uk
- How do UNIX file permissions work?
- How do Windows file permissions work?
- How do phpSuExec file permissions work?
- How do you block direct hot linking to image files using htaccess?
- How do you block directory scans using htaccess?
- How do you block directory scans using htaccess?/en
- How do you convert an htaccess.txt file into a .htaccess file?
- How do you convert an htaccess.txt file into a .htaccess file?/ca
- How do you convert an htaccess.txt file into a .htaccess file?/en
- How do you password protect directories using htaccess?
- How do you recursively adjust file and directory permissions?
- How do you restrict directory access by IP address using htaccess?
- How to add CSRF anti-spoofing to forms
- Htaccess examples (security)
- Secure coding guidelines
- Security Checklist
- Security Checklist/en
- Category:Security FAQ
- Security and Performance FAQs
- Security hotfixes for Joomla EOL versions
- Security hotfixes for Joomla EOL versions/en
- Taking the website temporarily offline
- Taking the website temporarily offline/en
- Top 10 Stupidest Administrator Tricks
- J3.x:Two Factor Authentication
- J3.x:Two Factor Authentication/de
- J3.x:Two Factor Authentication/en
- Verifying permissions
- Archived:Vulnerable Extensions List/Archive
- What are these strange (URL-Encoded) characters doing in your code?
- There's no one right way! Due to the variety and complexity of modern web servers, security issues can't be resolved with simple, one-size-fits-all solutions. You, or someone you trust, must learn enough about your web server infrastructure to make valid security decisions.
- There's no substitute for experience! To secure your web site, you must gain real experience , or get experienced help from others.
- It's not as hard as it looks: The following checklist may seem intimidating, but you don't have to deal with all of it at once. As you become more familiar with GNU/Linux, Apache, MySQL, PHP, HTTP, and Joomla, you'll add refinements to your combination of security tactics. Security is a moving target, so today's expert might be tomorrow's victim. Good luck!...
Please read Joomla! Administrators Security Checklist for more information.
See all documents in the Security Category.