Difference between revisions of "Security Checklist"
From Joomla! Documentation
m (improving page) |
m (padding to rowcolformat added in DPL call) |
||
(13 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
|state=off | |state=off | ||
|navbar=off | |navbar=off | ||
− | |title= | + | |title= |
|titlestyle=font-weight:normal; padding:5px; | |titlestyle=font-weight:normal; padding:5px; | ||
|image=[[File:Joomla vert logo.png|120px]] | |image=[[File:Joomla vert logo.png|120px]] | ||
− | |group1= Articles | + | |group1= Security Checklist Articles |
|group1style=font-size:1.1em; width:18%; | |group1style=font-size:1.1em; width:18%; | ||
|list1= | |list1= | ||
− | + | {{:Security Checklist/contents}} | |
− | + | |above= | |
− | + | <div style="border:1px solid navy; padding:15px; background-color:cornsilk; font-size:1.0em; text-align:left;"> | |
− | + | Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations. The articles below will point you in the right direction. At a minimum they will do two things: | |
− | + | #Inform you of typical security issues | |
− | + | #Point you in the right direction for more information | |
− | + | '''Please also see [[Security|Joomla! Security]] and the list of [[Vulnerable Extensions List|Vulnerable Extensions]]'''. | |
+ | </div> | ||
|list1style=padding-left:10px; font-size:1.2em; | |list1style=padding-left:10px; font-size:1.2em; | ||
− | + | |abovestyle=padding:10px; font-size:1.1em; | |
− | + | }}</br> | |
− | + | <div style="width:100%; clear:both;"> | |
− | | | + | <!-- This is list is DPL generated, add Security Checklist as a category to the article you wish to include --> |
− | + | {{box-header-sq|title=More Recommended Reading|noedit=yes|titlebackground=#DDDDFF|background=#fafafa }} | |
− | + | <small>More articles in the category "Security Checklist"</small> | |
− | + | {{#dpl:category=Security Checklist|namespace=|shownamespace=false|nottitlematch=Security Checklist/%|format=,\n*[[%PAGE%|%TITLE%]],,|columns=3|rowcolformat=cellpadding=10}}{{box-footer}}</div> | |
− | + | [[Category:Security Checklist]][[Category:Security]] | |
− | + | </noinclude> | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | | | ||
− | | | ||
− | | | ||
− | | | ||
− | |||
− | |||
− | |||
− | |||
− | *[[ | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− |
Revision as of 16:38, 29 October 2012
|
More Recommended Reading
More articles in the category "Security Checklist"