{"id":1479,"date":"2014-12-26T00:08:43","date_gmt":"2014-12-26T00:08:43","guid":{"rendered":"https:\/\/qbytes.cloud\/?p=1479"},"modified":"2014-12-26T00:08:43","modified_gmt":"2014-12-26T00:08:43","slug":"joomla-protection","status":"publish","type":"post","link":"https:\/\/www.qbytes.cloud\/index.php\/2014\/12\/26\/joomla-protection\/","title":{"rendered":"Joomla protection"},"content":{"rendered":"<p>How to start protecting your Joomla Site<\/p>\n<ol>\n<li>Always keep Joomla core up-to date<\/li>\n<li>Always make sure you run the latest patched\u00a0versions of extensions<\/li>\n<li>Make sure you choose strong passwords for all\u00a0logins<\/li>\n<li>Check your own website for vulnerabilities<\/li>\n<li>Always check the webserver&#8217;s log files for\u00a0potential hack attempts<\/li>\n<li>Secure your server if you host your Joomla\u00a0website on a VPS or even a dedicated server<\/li>\n<li>Create a list of all extensions you use and\u00a0try to monitor them. For example you can use\u00a0Google or security websites for staying\u00a0informed about the latest vulnerabilities.\u00a0Only use secure extensions.<\/li>\n<li>Use SEO for URL&#8217;s.\u00a0Activate the SEO features, use SEF URLs<\/li>\n<li>Furthermore most tools and scanners are not able to\u00a0work with search engine friendly URLs<\/li>\n<li>This might be a big surprise, but with these\u00a0measures you already gained a decent protection\u00a0level.<\/li>\n<li>The last things to do would be to rename the Joomla\u00a0backend folder from &#8220;administrator&#8221; to may be\u00a0&#8220;admin_acp_1234567&#8221; in order to prevent script kiddies\u00a0and scanners from finding your Joomla backend.<\/li>\n<li>And, last but not least, protect the PHPMyAdmin\u00a0login (if you have any) with .htaccess files.\u00a0You can&#8217;t do this with the Joomla admin control\u00a0panel since some components need to have access to\u00a0administrator\/components.)<\/li>\n<\/ol>\n<p>Source:\u00a0http:\/\/www.exploit-db.com\/papers\/15780\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to start protecting your Joomla Site Always keep Joomla core up-to date Always make sure you run the latest patched\u00a0versions of extensions Make sure you choose strong passwords for all\u00a0logins Check your own website for vulnerabilities Always check the webserver&#8217;s log files for\u00a0potential hack attempts Secure your server if you host your Joomla\u00a0website on &#8230; <a title=\"Joomla protection\" class=\"read-more\" href=\"https:\/\/www.qbytes.cloud\/index.php\/2014\/12\/26\/joomla-protection\/\" aria-label=\"Read more about Joomla protection\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[102],"tags":[],"class_list":["post-1479","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts\/1479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/comments?post=1479"}],"version-history":[{"count":0,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts\/1479\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/media?parent=1479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/categories?post=1479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/tags?post=1479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}