Difference between revisions of "Security Checklist"
From Joomla! Documentation
(Marked for translation) |
(Corrected a URL.) |
||
Line 6: | Line 6: | ||
#Point you in the right direction for more information</translate> | #Point you in the right direction for more information</translate> | ||
{{tip|<translate><!--T:1--> | {{tip|<translate><!--T:1--> | ||
− | See also the [[S:MyLanguage/Security|Joomla! Security]] and the list of [ | + | See also the [[S:MyLanguage/Security|Joomla! Security]] and the list of [https://extensions.joomla.org/vulnerable-extensions/about/ Vulnerable Extensions].</translate>|title=<translate><!--T:2--> |
For more articles and information:</translate>}} | For more articles and information:</translate>}} | ||
<div class="large-6 column"> | <div class="large-6 column"> |
Latest revision as of 11:01, 23 August 2022
Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.
The articles below will point you in the right direction. At a minimum they will do two things:
- Inform you of typical security issues
- Point you in the right direction for more information
For more articles and information:
See also the Joomla! Security and the list of Vulnerable Extensions.
Security Checklist Articles
- Getting Started
- Hosting and Server Setup
- Enabling HTTPS on your site
- Learn about file permissions
- Testing and Development
- Joomla! Setup
- Site Administration
- Site Recovery
- You have been hacked or defaced
Recommended Reading
- How do UNIX file permissions work?
- How do Windows file permissions work?
- How do phpSuExec file permissions work?
- Magic quotes and security
- Securing Joomla extensions
For more articles and information:
See also the Category for the Security Checklist.