Difference between revisions of "Security Checklist/Site Recovery"
From Joomla! Documentation
< Security Checklist
Line 4: | Line 4: | ||
<ol> | <ol> | ||
− | <li>[[Security_and_Performance_FAQs#Help.21_My_site.27s_been_compromised._Now_what.3F]]</li> | + | <li>Know the important steps to follow when your site has been compromised '''([[Security_and_Performance_FAQs#Help.21_My_site.27s_been_compromised._Now_what.3F|FAQ]])'''</li> |
<li>Always have complete backups.</li> | <li>Always have complete backups.</li> | ||
<li>Know how to find exploit attempts using the *NIX shell.</li> | <li>Know how to find exploit attempts using the *NIX shell.</li> |
Revision as of 02:55, 22 October 2008
Site Recovery[edit]
- Know the important steps to follow when your site has been compromised (FAQ)
- Always have complete backups.
- Know how to find exploit attempts using the *NIX shell.
- Have a tested plan for how you will recover when your site's been compromised.
Your Turn...[edit]
- If you discover a bug in Joomla! core files, report it here.