Difference between revisions of "Security Checklist"
From Joomla! Documentation
m (Marked for translation) |
(Corrected a URL.) |
||
(4 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
<noinclude><languages /></noinclude> | <noinclude><languages /></noinclude> | ||
− | < | + | <translate><!--T:11--> |
Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.<br /> | Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.<br /> | ||
The articles below will point you in the right direction. At a minimum they will do two things: | The articles below will point you in the right direction. At a minimum they will do two things: | ||
#Inform you of typical security issues | #Inform you of typical security issues | ||
− | #Point you in the right direction for more information | + | #Point you in the right direction for more information</translate> |
{{tip|<translate><!--T:1--> | {{tip|<translate><!--T:1--> | ||
− | See also the [[S:MyLanguage/Security|Joomla! Security]] and the list of [ | + | See also the [[S:MyLanguage/Security|Joomla! Security]] and the list of [https://extensions.joomla.org/vulnerable-extensions/about/ Vulnerable Extensions].</translate>|title=<translate><!--T:2--> |
For more articles and information:</translate>}} | For more articles and information:</translate>}} | ||
<div class="large-6 column"> | <div class="large-6 column"> | ||
Line 15: | Line 15: | ||
<div class="large-6 column">{{section portal heading|icon=book|title=<translate><!--T:5--> | <div class="large-6 column">{{section portal heading|icon=book|title=<translate><!--T:5--> | ||
Recommended Reading</translate>}} | Recommended Reading</translate>}} | ||
− | <translate>*[[S:MyLanguage/How do UNIX file permissions work?|How do UNIX file permissions work?]] | + | <translate><!--T:8--> |
+ | *[[S:MyLanguage/How do UNIX file permissions work?|How do UNIX file permissions work?]] | ||
*[[S:MyLanguage/How do Windows file permissions work?|How do Windows file permissions work?]] | *[[S:MyLanguage/How do Windows file permissions work?|How do Windows file permissions work?]] | ||
*[[S:MyLanguage/How do phpSuExec file permissions work?|How do phpSuExec file permissions work?]] | *[[S:MyLanguage/How do phpSuExec file permissions work?|How do phpSuExec file permissions work?]] | ||
*[[S:MyLanguage/Magic quotes and security|Magic quotes and security]] | *[[S:MyLanguage/Magic quotes and security|Magic quotes and security]] | ||
*[[S:MyLanguage/Securing Joomla extensions|Securing Joomla extensions]]</translate> | *[[S:MyLanguage/Securing Joomla extensions|Securing Joomla extensions]]</translate> | ||
− | {{tip|<translate>See also the [[S:MyLanguage/Category:Security_Checklist|Category for the Security Checklist]].</translate>|title=<translate>For more articles and information:</translate>}} | + | {{tip|<translate><!--T:9--> |
+ | See also the [[S:MyLanguage/Category:Security_Checklist|Category for the Security Checklist]].</translate>|title=<translate><!--T:10--> | ||
+ | For more articles and information:</translate>}} | ||
</div> | </div> | ||
Latest revision as of 11:01, 23 August 2022
Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.
The articles below will point you in the right direction. At a minimum they will do two things:
- Inform you of typical security issues
- Point you in the right direction for more information
For more articles and information:
See also the Joomla! Security and the list of Vulnerable Extensions.
Security Checklist Articles
- Getting Started
- Hosting and Server Setup
- Enabling HTTPS on your site
- Learn about file permissions
- Testing and Development
- Joomla! Setup
- Site Administration
- Site Recovery
- You have been hacked or defaced
Recommended Reading
- How do UNIX file permissions work?
- How do Windows file permissions work?
- How do phpSuExec file permissions work?
- Magic quotes and security
- Securing Joomla extensions
For more articles and information:
See also the Category for the Security Checklist.