Security Checklist/fa: Difference between revisions
From Joomla! Documentation
Created page with "fa" |
Created page with "خواندنی های توصیه شده" |
||
Line 8: | Line 8: | ||
{{section portal heading|icon=check-square|title=Security Checklist Articles}}{{:Security_Checklist/contents/fa}} | {{section portal heading|icon=check-square|title=Security Checklist Articles}}{{:Security_Checklist/contents/fa}} | ||
</div> | </div> | ||
<div class="large-6 column">{{section portal heading|icon=book|title= | <div class="large-6 column">{{section portal heading|icon=book|title=خواندنی های توصیه شده}} | ||
*[[S:MyLanguage/How do UNIX file permissions work?|How do UNIX file permissions work?]] | *[[S:MyLanguage/How do UNIX file permissions work?|How do UNIX file permissions work?]] | ||
*[[S:MyLanguage/How do Windows file permissions work?|How do Windows file permissions work?]] | *[[S:MyLanguage/How do Windows file permissions work?|How do Windows file permissions work?]] |
Revision as of 09:56, 1 March 2016
Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.
The articles below will point you in the right direction. At a minimum they will do two things:
- Inform you of typical security issues
- Point you in the right direction for more information
For more articles and information:
See also the Joomla! Security and the list of Vulnerable Extensions.
Security Checklist Articles
- Getting Started
- Hosting and Server Setup
- Enabling HTTPS on your site
- Learn about file permissions
- Testing and Development
- Joomla! Setup
- Site Administration
- Site Recovery
- You have been hacked or defaced
خواندنی های توصیه شده
- How do UNIX file permissions work?
- How do Windows file permissions work?
- How do phpSuExec file permissions work?
- Magic quotes and security
- Securing Joomla extensions
For more articles and information:
See also the Category for the Security Checklist.