Difference between revisions of "Security Checklist/Site Recovery"

From Joomla! Documentation

< Security Checklist
Line 4: Line 4:
  
 
<ol>
 
<ol>
<li>[[Security_and_Performance_FAQs#Help.21_My_site.27s_been_compromised._Now_what.3F]]</li>
+
<li>Know the important steps to follow when your site has been compromised '''([[Security_and_Performance_FAQs#Help.21_My_site.27s_been_compromised._Now_what.3F|FAQ]])'''</li>
 
<li>Always have complete backups.</li>
 
<li>Always have complete backups.</li>
 
<li>Know how to find exploit attempts using the *NIX shell.</li>
 
<li>Know how to find exploit attempts using the *NIX shell.</li>

Revision as of 02:55, 22 October 2008

Site Recovery[edit]

  1. Know the important steps to follow when your site has been compromised (FAQ)
  2. Always have complete backups.
  3. Know how to find exploit attempts using the *NIX shell.
  4. Have a tested plan for how you will recover when your site's been compromised.

Your Turn...[edit]

  1. If you discover a bug in Joomla! core files, report it here.