Difference between revisions of "Security Checklist"
From Joomla! Documentation
(Marked this version for translation) |
(Marked for translation) |
||
Line 1: | Line 1: | ||
<noinclude><languages /></noinclude> | <noinclude><languages /></noinclude> | ||
− | |||
<translate><!--T:11--> | <translate><!--T:11--> | ||
Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.<br /> | Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.<br /> |
Revision as of 05:43, 7 June 2015
Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.
The articles below will point you in the right direction. At a minimum they will do two things:
- Inform you of typical security issues
- Point you in the right direction for more information
For more articles and information:
See also the Joomla! Security and the list of Vulnerable Extensions.
Security Checklist Articles
- Getting Started
- Hosting and Server Setup
- Enabling HTTPS on your site
- Learn about file permissions
- Testing and Development
- Joomla! Setup
- Site Administration
- Site Recovery
- You have been hacked or defaced
Recommended Reading
- How do UNIX file permissions work?
- How do Windows file permissions work?
- How do phpSuExec file permissions work?
- Magic quotes and security
- Securing Joomla extensions
For more articles and information:
See also the Category for the Security Checklist.