13 better security tips for Joomla CMS
TipsMake.com - With the current popularity of Joomla, it is not surprising if many hackers take it as the main goal. However, you don't need to worry. There are a number of things you can do to increase the security of your website, this article will offer those solutions.
Joomla is popularly developed as an open source CMS, which is increasingly being used by many individuals and businesses as the foundation for their online products and services. In fact, more than 2.5% of websites run Joomla CMS - this is a good goal for hackers to attack.
Joomla is free and has more than 8,600 extended settings ( extensions ) that allow you to do most of what you want on CMS. Add to that a strong development community that helps you see that this is an attractive product and also attractive to hackers. For that reason, you need to do a few things when using this platform to prevent attacks and increase the security of your CMS.
The platform for installing this platform is just one of the weaknesses of the system, most of its security issues relate to Joomla's code. Most problems arise from the old version, are not updated regularly or sometimes due to the expansion settings (third party extension ).
1. Server and Host
There are no important decisions by selecting the appropriate host or host. Many problems may arise because the server / host has not been patched, some ports are open or the shared security is poor. Even if the server is set up correctly, the system can still be attacked by another website hosted on that server with poor security. If you're using a poor host, think about switching providers or it's best to replace it with a separate server so you don't have shared security issues.
Currently there are some famous and quite secure Hosting providers like Brinkster or Godaddy.
Store your website on a server running PHP 5.2 or better in CGI mode with Su_PHP. Su_PHP basically allows script execution under a specific user account, as opposed to Apache's default account. This makes it easy to identify and track security areas.
Make sure you are using the latest version of Apache and configuring Apache does not allow browsing / indexing ( browsing / indexing ). IT managers also need to ensure that there are appropriate settings for the location of the .htaccess , serverconfig and php.ini files .
2. Activate and use htaccess file
By default, htaccess files are not used. Make sure you rename it from .htaccess.txt to .htaccess , then it needs to be placed in the root directory of the website. You can also add some rewrite rules for it to prevent the possibility of being exploited. You can find more instructions on editing htaccess files for additional protection for the system.
3. Use accounts and Permission
Joomla works well from the beginning after properly installing on the server. You need to set all CHMOD files to 644 and folders to 755. There are some exceptions to this rule as the configuration.php file will convert CHMOD to 640 . Make sure nothing is set to 777.
The default administrator account name is usually " admin ", you must immediately change this account name. It will make it a little more difficult for hackers to find account name details.
4. Backup and troubleshooting
Take the time to consider a troubleshooting plan first, not after your website is visited by hackers. Advance the outline of what will happen if you become a victim. Must remember: " Backup early and often ". If this step works well, the biggest pressure when the website is hacked is gone, because the data is the most important, you've always backed up. Perform daily backups or even - if possible - for hours to ensure that when you restore, your website has no downtime or data loss. Once a backup is available, the only thing to worry about when a problem occurs is to look for a vulnerability on the website.
5. Carefully manage the extension settings (extension)
Third-party extensions are what make Joomla so popular, but it is many times the way to get into your website. Each different extension is an object that you need to update patches on a regular basis. This is also the reason you need to consider installing only really necessary extensions. You should be sure to take the following steps:
- Implement the review code for any extension used.
- Run a test set (there are many on-line) and review the results.
- Update and patch the extension as needed.
Remember, an unsafe extension can harm your entire website.
6. Delete the version number of the extended installation
Typically, exploits typically specify a specific version of the extension, which is why you should delete the version number information of any installed extensions. Removing version numbers can prevent an attack before it happens.
You can edit the extension so that it only displays the name using a tool like Dreamweaver. Do a global search and replace all the necessary information in the file extension folder.
7. Remove unused files
You install a lot of extensions but don't use it? This is not only a weakness but also garbage for your server. Please remove them completely to avoid possible inconvenience.
8. Password protection
Common attacks often target weak passwords. Make a good habit: Regularly change your password and it must ensure 4 elements: uppercase, lowercase, special characters and numbers .
Your database (CSDL) is very important. A SQL injection attack or any other type of attack on the database can make your whole month of work disappear. Make sure your database access is a password protected at MySQL level. Try using tools like Nikto or Nmap to scan the system, look for open exploits and weaknesses.
Password protection in Joomla administration section is at the directory level. This password adds an additional layer of security. It is usually a different username and password.
9. Change the Prefix to the default table
Most SQL injection attacks often try to access the jos_users database table. Once hackers can access this file, they get the corresponding user name and password - including the senior administrator. Using a short, random name to replace this default name helps prevent most database attacks.
If you are using Joomla 1.5, you can use DB administration components to do this. If you're using version 1.6 and don't make changes during the installation, this process can still be done but it's a bit more complicated.
In other versions of Joomla, including 1.7, random table names are used during the installation process to combat these types of attacks.
10. Use SSL certificate
Use SSL on your website for all member login. Note that you must have a properly configured SSL certificate for your website domain (SSL certificate sharing will not work).
11. Disable Joomla FTP Layer
Disable the FTP Layer of Joomla and make sure it does not save your login information.
12. Turn off Register_globals
Turn off Register_globals, but you must know that this can disable some PHP working scripts, and may affect other programs that your website is using. To do this, simply edit the php.ini file of the website in the root of the domain name.
13. Friendly URL for search engine
Always use search engine friendly URLs. This not only improves Google's website rankings but also prevents hackers from exploiting Google's search results.
References:
- http://www.joomla.org
- http://secunia.com/advisories/product/5788/
- http://trends.builtwith.com/cms
- http://www.opensourcevarsity.com/joomla1-7/joomla17install
- http://blog.rochenhost.com/2008/09/joomla-security-ever-been-hacked-sorting-fact-from-fiction-some-useful-joomla-hosting-tips-including-some-you-might- now-know /
- http://www.siteground.com/tutorials/joomla15/joomla_security.htm
- http://docs.joomla.org/Vulnerable_Extensions_List
- http://docs.joomla.org/Category:Security_Checklist
- http://en.wikipedia.org/wiki/Joomla
- http://www.securelive.net/
- http://www.howtojoomla.net/how-tos/security/joomla-security-primer
You should read it
- Download the latest Joomla version to fix a serious SQL Injection vulnerability
- From Joomla! to Joomla! Vietnam
- How to Manage a Joomla! Website with JSN Poweradmin
- Warning: The number of vulnerabilities in open source software are increasing rapidly
- 7 Great open source security apps you may not know yet
- Facebook turns Fizz - a library that enhances security protocols - into open source
- Symposium on IBM Security and Security 2011
- Cisco Linksys WRT160NL - 'toy' specifically for open source people
- Found 37 security holes in VNC on Linux, Windows
- Security in difficult economic times
- Is Drupal or WordPress the best open source CMS?
- Awareness and experience - the most important factor in every network security process