Security Checklist/zh-tw: Difference between revisions
From Joomla! Documentation
Created page with "安全檢查清單" |
Created page with "更多的文章及資訊:" |
||
Line 4: | Line 4: | ||
#Inform you of typical security issues | #Inform you of typical security issues | ||
#Point you in the right direction for more information | #Point you in the right direction for more information | ||
{{tip|See also the [[S:MyLanguage/Security|Joomla! Security]] and the list of [http://vel.joomla.org Vulnerable Extensions].|title= | {{tip|See also the [[S:MyLanguage/Security|Joomla! Security]] and the list of [http://vel.joomla.org Vulnerable Extensions].|title=更多的文章及資訊:}} | ||
<div class="large-6 column"> | <div class="large-6 column"> | ||
{{section portal heading|icon=check-square|title=Security Checklist Articles}}{{:Security_Checklist/contents/en}} | {{section portal heading|icon=check-square|title=Security Checklist Articles}}{{:Security_Checklist/contents/en}} |
Revision as of 08:46, 31 December 2020
Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.
The articles below will point you in the right direction. At a minimum they will do two things:
- Inform you of typical security issues
- Point you in the right direction for more information
更多的文章及資訊:
See also the Joomla! Security and the list of Vulnerable Extensions.
Security Checklist Articles
- Getting Started
- Hosting and Server Setup
- Enabling HTTPS on your site
- Learn about file permissions
- Testing and Development
- Joomla! Setup
- Site Administration
- Site Recovery
- You have been hacked or defaced
Recommended Reading
- How do UNIX file permissions work?
- How do Windows file permissions work?
- How do phpSuExec file permissions work?
- Magic quotes and security
- Securing Joomla extensions
For more articles and information:
See also the Category for the Security Checklist.