Security Checklist/fa: Difference between revisions

From Joomla! Documentation

Created page with "fa"
 
Created page with "خواندنی های توصیه شده"
Line 8: Line 8:
{{section portal heading|icon=check-square|title=Security Checklist Articles}}{{:Security_Checklist/contents/fa}}
{{section portal heading|icon=check-square|title=Security Checklist Articles}}{{:Security_Checklist/contents/fa}}
</div>
</div>
<div class="large-6 column">{{section portal heading|icon=book|title=Recommended Reading}}
<div class="large-6 column">{{section portal heading|icon=book|title=خواندنی های توصیه شده}}
*[[S:MyLanguage/How do UNIX file permissions work?|How do UNIX file permissions work?]]
*[[S:MyLanguage/How do UNIX file permissions work?|How do UNIX file permissions work?]]
*[[S:MyLanguage/How do Windows file permissions work?|How do Windows file permissions work?]]
*[[S:MyLanguage/How do Windows file permissions work?|How do Windows file permissions work?]]

Revision as of 09:56, 1 March 2016

Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.
The articles below will point you in the right direction. At a minimum they will do two things:

  1. Inform you of typical security issues
  2. Point you in the right direction for more information
For more articles and information:

See also the Joomla! Security and the list of Vulnerable Extensions.