Security Checklist/el: Difference between revisions

From Joomla! Documentation

Created page with "Συνιστούμε να διαβάσετε"
Created page with "*Πώς δουλεύουν τα δικαιώματα αρχείων στο UNIX; *S:MyLanguage/How do Windows file permis..."
Line 9: Line 9:
</div>
</div>
<div class="large-6 column">{{section portal heading|icon=book|title=Συνιστούμε να διαβάσετε}}
<div class="large-6 column">{{section portal heading|icon=book|title=Συνιστούμε να διαβάσετε}}
*[[S:MyLanguage/How do UNIX file permissions work?|How do UNIX file permissions work?]]
*[[S:MyLanguage/How do UNIX file permissions work?|Πώς δουλεύουν τα δικαιώματα αρχείων στο UNIX;]]
*[[S:MyLanguage/How do Windows file permissions work?|How do Windows file permissions work?]]
*[[S:MyLanguage/How do Windows file permissions work?|Πώς δουλεύουν τα δικαιώματα αρχείων στα Windows;]]
*[[S:MyLanguage/How do phpSuExec file permissions work?|How do phpSuExec file permissions work?]]
*[[S:MyLanguage/How do phpSuExec file permissions work?|Πώς δουλεύουν τα δικαιώματα αρχείων σς phpSuExec;]]
*[[S:MyLanguage/Magic quotes and security|Magic quotes and security]]
*[[S:MyLanguage/Magic quotes and security|Magic quotes και ασφάλεια]]
*[[S:MyLanguage/Securing Joomla extensions|Securing Joomla extensions]]
*[[S:MyLanguage/Securing Joomla extensions|Ασφάλεια σε επεκτάσεις του Joomla]]
{{tip|See also the [[S:MyLanguage/Category:Security_Checklist|Category for the Security Checklist]].|title=For more articles and information:}}
{{tip|See also the [[S:MyLanguage/Category:Security_Checklist|Category for the Security Checklist]].|title=For more articles and information:}}
</div>
</div>

Revision as of 14:18, 6 April 2020

Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.
The articles below will point you in the right direction. At a minimum they will do two things:

  1. Inform you of typical security issues
  2. Point you in the right direction for more information
Περισσότερα άρθρα και πληροφορίες:

See also the Joomla! Security and the list of Vulnerable Extensions.