Difference between revisions of "Security Checklist"

From Joomla! Documentation

m (Marked for translation)
(Corrected a URL.)
 
(4 intermediate revisions by one other user not shown)
Line 1: Line 1:
 
<noinclude><languages /></noinclude>
 
<noinclude><languages /></noinclude>
<noinclude><i class="icon-lock icon-4x pull-right icon-border"></i></noinclude>
+
<translate><!--T:11-->
 
Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.<br />
 
Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.<br />
 
The articles below will point you in the right direction. At a minimum they will do two things:  
 
The articles below will point you in the right direction. At a minimum they will do two things:  
 
#Inform you of typical security issues
 
#Inform you of typical security issues
#Point you in the right direction for more information
+
#Point you in the right direction for more information</translate>
 
{{tip|<translate><!--T:1-->
 
{{tip|<translate><!--T:1-->
See also the [[S:MyLanguage/Security|Joomla! Security]] and the list of [http://vel.joomla.org Vulnerable Extensions].</translate>|title=<translate><!--T:2-->
+
See also the [[S:MyLanguage/Security|Joomla! Security]] and the list of [https://extensions.joomla.org/vulnerable-extensions/about/ Vulnerable Extensions].</translate>|title=<translate><!--T:2-->
 
For more articles and information:</translate>}}  
 
For more articles and information:</translate>}}  
 
<div class="large-6 column">
 
<div class="large-6 column">
Line 15: Line 15:
 
<div class="large-6 column">{{section portal heading|icon=book|title=<translate><!--T:5-->
 
<div class="large-6 column">{{section portal heading|icon=book|title=<translate><!--T:5-->
 
Recommended Reading</translate>}}
 
Recommended Reading</translate>}}
<translate>*[[S:MyLanguage/How do UNIX file permissions work?|How do UNIX file permissions work?]]
+
<translate><!--T:8-->
 +
*[[S:MyLanguage/How do UNIX file permissions work?|How do UNIX file permissions work?]]
 
*[[S:MyLanguage/How do Windows file permissions work?|How do Windows file permissions work?]]
 
*[[S:MyLanguage/How do Windows file permissions work?|How do Windows file permissions work?]]
 
*[[S:MyLanguage/How do phpSuExec file permissions work?|How do phpSuExec file permissions work?]]
 
*[[S:MyLanguage/How do phpSuExec file permissions work?|How do phpSuExec file permissions work?]]
 
*[[S:MyLanguage/Magic quotes and security|Magic quotes and security]]
 
*[[S:MyLanguage/Magic quotes and security|Magic quotes and security]]
 
*[[S:MyLanguage/Securing Joomla extensions|Securing Joomla extensions]]</translate>
 
*[[S:MyLanguage/Securing Joomla extensions|Securing Joomla extensions]]</translate>
{{tip|<translate>See also the [[S:MyLanguage/Category:Security_Checklist|Category for the Security Checklist]].</translate>|title=<translate>For more articles and information:</translate>}}
+
{{tip|<translate><!--T:9-->
 +
See also the [[S:MyLanguage/Category:Security_Checklist|Category for the Security Checklist]].</translate>|title=<translate><!--T:10-->
 +
For more articles and information:</translate>}}
 
</div>
 
</div>
  

Latest revision as of 11:01, 23 August 2022

Other languages:
Bahasa Indonesia • ‎Deutsch • ‎English • ‎Nederlands • ‎eesti • ‎español • ‎français • ‎português • ‎português do Brasil • ‎Ελληνικά • ‎русский • ‎العربية • ‎فارسی • ‎ไทย • ‎中文(台灣)‎ • ‎日本語

Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.
The articles below will point you in the right direction. At a minimum they will do two things:

  1. Inform you of typical security issues
  2. Point you in the right direction for more information
For more articles and information:

See also the Joomla! Security and the list of Vulnerable Extensions.