SlideShare a Scribd company logo
1 of 19
Securing Your Joomla Website Mike Carson http://joomlashowroom.com Joomla! Day New york CityDecember 4th & 5th, 2010
Is Joomla Secure? YES! Joomlais 100% Secure. Untilyouinstallit on a server
WhyWorry? BecauseJoomladoesn’t come with a TrunkMonkey.
What Can I Do? Understandthatsecurityis a layeredapproach Select a properhostingcompany Follow best practice guidelines Use the toolsthat are available TAKE IT SERIOUSLY!  MAKE IT MANDATORY!!!
Initial Steps Change the jos_databaseprefix RemoveAdmin user Turn OFF the WYSIWYG editor Subscribe to the Joomla Security Updates list
Let’s Talk Tools Security startsat home Use a good anti-virus software likeKaspersky Use a passwordgenerator/managerKeepass.info or keepassx.org Browser Updates Operating System updates Use secure SFTP toolsWinSCP, Filezilla, Dreamweaver, Putty SSH
Quality Joomla Hosting Cloudaccess.net Rochenhost.com Plexicloud.com 1and1.com Simplweb.com Stayawayfrom godaddy.com, siteground.com, dreamhost.com, Yahoo Web Hosting General rule of thumb: You getwhatyoupay for!
Permissions Use proper permissions on files and directories.  They should never be 777 What they should be: Files = 644  Directories = 755
Akeeba Backup Akeeba Backup Akeebabackup.com 2 versions to choosefrom (Core and Pro) Backup your entire site and its database with a single click Automatic Backups (Cron and Cron-less) Offsite Backups to S3, Dropbox, Rackspace, FTP Test your backups once in a while
Akeeba AdminTools AkeebaAdmin Tools Pro – Akeebabackup.com IntegratedJoomla Updater Web Application Firewall IP Whitelist/Blacklist, Bad Words Filter, Security Exceptions Log Htaccess File Maker – Experts ONLY! Permissions Fixer
OtherAdminSecurity Tools Jsecure Plugin - joomlaserviceprovider.com JomDefender – corePHP.com JooReCapchta - joomla.stefysoft.com sh404sef – dev.anything-digital.com Secure Live – securelive.net PHP Security Suite - opensource-excellence.com
Additional Suggestions Completelyremoveunused extensions Leave FTP File Layer disabled From the Joomla administrator area make sure the Register Globals is set to off Avoid using PHP4
DisasterRecovery Plan Create a DisasterRecovery Plan A list of the sites you maintain  A list of user names and passwords for your sites  The databases names, server addresses or IP, user names and passwords, that are used for your list of sites  FTP user names and passwords for each of your sites  Your web hosts tech support number  Have a backup web host decided in case for some reason you need to move quickly  Know how to get into your domain registrar so you can change Name Servers if needed  Name, number, email of a web professional that may be able to help restore your systems if needed  Practice a FULL recovery
So noweverything is all good, right? UH OH
I’ve Been Hacked Don’t Panic!  Remember? You have a disasterrecovery plan. Login and change youradminpassword. Browseyour files for anythingobviouslyunusualthatdoesn’tbelong. Grabyourlatest few backups and compare those to make sure they do not alsocontainanypayloads. Downloadyour server log files. Check you logs for IP's calling suspicious files or attempting POST commands to non-form's. Notify your host and work with them to clean up the site, and to make sure there are no back doors to your site or hire a professional to help Restore yourwebsitewith a clean backup copy. EnsureJoomla and your extensions are all using the latest versions.
DatabasePasswords Changingyour super adminpassword in MySQL Go to adamek.biz/md5-generator.php
DatabasePasswords ,[object Object]
Then browse the Super Admin record you want to change
Then paste your new MD5 encrypted password into the password field.

More Related Content

Viewers also liked

Seven habits of highly effective persons
Seven habits of  highly effective personsSeven habits of  highly effective persons
Seven habits of highly effective personsR V
 
Inga CV detailed Nov 2015
Inga CV detailed Nov 2015Inga CV detailed Nov 2015
Inga CV detailed Nov 2015ingasolomons
 
Why is the sky blue
Why is the sky blueWhy is the sky blue
Why is the sky blueLuis Torre
 
самара космическая верфь россии(гагаринцы)
самара   космическая верфь россии(гагаринцы)самара   космическая верфь россии(гагаринцы)
самара космическая верфь россии(гагаринцы)Lopatino
 
Microfundo - Tune Your World
Microfundo - Tune Your WorldMicrofundo - Tune Your World
Microfundo - Tune Your WorldBrad Powell
 
Bilute de baie efervescente- tutorial
Bilute de baie efervescente- tutorialBilute de baie efervescente- tutorial
Bilute de baie efervescente- tutorialMihaela Bondoc
 
Securing Your Joomla website
Securing Your Joomla websiteSecuring Your Joomla website
Securing Your Joomla websiteMike Carson
 
presentación de word
 presentación de word  presentación de word
presentación de word checheleytor
 
Social Media Initiative TCU Women's Tennis
Social Media Initiative TCU Women's TennisSocial Media Initiative TCU Women's Tennis
Social Media Initiative TCU Women's Tennisdanceralltheway
 

Viewers also liked (9)

Seven habits of highly effective persons
Seven habits of  highly effective personsSeven habits of  highly effective persons
Seven habits of highly effective persons
 
Inga CV detailed Nov 2015
Inga CV detailed Nov 2015Inga CV detailed Nov 2015
Inga CV detailed Nov 2015
 
Why is the sky blue
Why is the sky blueWhy is the sky blue
Why is the sky blue
 
самара космическая верфь россии(гагаринцы)
самара   космическая верфь россии(гагаринцы)самара   космическая верфь россии(гагаринцы)
самара космическая верфь россии(гагаринцы)
 
Microfundo - Tune Your World
Microfundo - Tune Your WorldMicrofundo - Tune Your World
Microfundo - Tune Your World
 
Bilute de baie efervescente- tutorial
Bilute de baie efervescente- tutorialBilute de baie efervescente- tutorial
Bilute de baie efervescente- tutorial
 
Securing Your Joomla website
Securing Your Joomla websiteSecuring Your Joomla website
Securing Your Joomla website
 
presentación de word
 presentación de word  presentación de word
presentación de word
 
Social Media Initiative TCU Women's Tennis
Social Media Initiative TCU Women's TennisSocial Media Initiative TCU Women's Tennis
Social Media Initiative TCU Women's Tennis
 

More from Mike Carson

Joomla Onsite SEO Guidelines for 2015
Joomla Onsite SEO Guidelines for 2015Joomla Onsite SEO Guidelines for 2015
Joomla Onsite SEO Guidelines for 2015Mike Carson
 
Joomla 2.5 New Features and Hidden Gems
Joomla 2.5 New Features and Hidden GemsJoomla 2.5 New Features and Hidden Gems
Joomla 2.5 New Features and Hidden GemsMike Carson
 
Wireframing and Prototyping Presentation
Wireframing and Prototyping PresentationWireframing and Prototyping Presentation
Wireframing and Prototyping PresentationMike Carson
 
Joomla Content Delivery Networks
Joomla Content Delivery NetworksJoomla Content Delivery Networks
Joomla Content Delivery NetworksMike Carson
 

More from Mike Carson (6)

Ecommerce 101
Ecommerce 101Ecommerce 101
Ecommerce 101
 
Joomla Onsite SEO Guidelines for 2015
Joomla Onsite SEO Guidelines for 2015Joomla Onsite SEO Guidelines for 2015
Joomla Onsite SEO Guidelines for 2015
 
Joomla 2.5 New Features and Hidden Gems
Joomla 2.5 New Features and Hidden GemsJoomla 2.5 New Features and Hidden Gems
Joomla 2.5 New Features and Hidden Gems
 
Wireframing and Prototyping Presentation
Wireframing and Prototyping PresentationWireframing and Prototyping Presentation
Wireframing and Prototyping Presentation
 
Ecommerce 101
Ecommerce 101Ecommerce 101
Ecommerce 101
 
Joomla Content Delivery Networks
Joomla Content Delivery NetworksJoomla Content Delivery Networks
Joomla Content Delivery Networks
 

Recently uploaded

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Recently uploaded (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

Securing Your Joomla Website

  • 1. Securing Your Joomla Website Mike Carson http://joomlashowroom.com Joomla! Day New york CityDecember 4th & 5th, 2010
  • 2. Is Joomla Secure? YES! Joomlais 100% Secure. Untilyouinstallit on a server
  • 4. What Can I Do? Understandthatsecurityis a layeredapproach Select a properhostingcompany Follow best practice guidelines Use the toolsthat are available TAKE IT SERIOUSLY! MAKE IT MANDATORY!!!
  • 5. Initial Steps Change the jos_databaseprefix RemoveAdmin user Turn OFF the WYSIWYG editor Subscribe to the Joomla Security Updates list
  • 6. Let’s Talk Tools Security startsat home Use a good anti-virus software likeKaspersky Use a passwordgenerator/managerKeepass.info or keepassx.org Browser Updates Operating System updates Use secure SFTP toolsWinSCP, Filezilla, Dreamweaver, Putty SSH
  • 7. Quality Joomla Hosting Cloudaccess.net Rochenhost.com Plexicloud.com 1and1.com Simplweb.com Stayawayfrom godaddy.com, siteground.com, dreamhost.com, Yahoo Web Hosting General rule of thumb: You getwhatyoupay for!
  • 8. Permissions Use proper permissions on files and directories. They should never be 777 What they should be: Files = 644 Directories = 755
  • 9. Akeeba Backup Akeeba Backup Akeebabackup.com 2 versions to choosefrom (Core and Pro) Backup your entire site and its database with a single click Automatic Backups (Cron and Cron-less) Offsite Backups to S3, Dropbox, Rackspace, FTP Test your backups once in a while
  • 10. Akeeba AdminTools AkeebaAdmin Tools Pro – Akeebabackup.com IntegratedJoomla Updater Web Application Firewall IP Whitelist/Blacklist, Bad Words Filter, Security Exceptions Log Htaccess File Maker – Experts ONLY! Permissions Fixer
  • 11. OtherAdminSecurity Tools Jsecure Plugin - joomlaserviceprovider.com JomDefender – corePHP.com JooReCapchta - joomla.stefysoft.com sh404sef – dev.anything-digital.com Secure Live – securelive.net PHP Security Suite - opensource-excellence.com
  • 12. Additional Suggestions Completelyremoveunused extensions Leave FTP File Layer disabled From the Joomla administrator area make sure the Register Globals is set to off Avoid using PHP4
  • 13. DisasterRecovery Plan Create a DisasterRecovery Plan A list of the sites you maintain A list of user names and passwords for your sites The databases names, server addresses or IP, user names and passwords, that are used for your list of sites FTP user names and passwords for each of your sites Your web hosts tech support number Have a backup web host decided in case for some reason you need to move quickly Know how to get into your domain registrar so you can change Name Servers if needed Name, number, email of a web professional that may be able to help restore your systems if needed Practice a FULL recovery
  • 14. So noweverything is all good, right? UH OH
  • 15. I’ve Been Hacked Don’t Panic! Remember? You have a disasterrecovery plan. Login and change youradminpassword. Browseyour files for anythingobviouslyunusualthatdoesn’tbelong. Grabyourlatest few backups and compare those to make sure they do not alsocontainanypayloads. Downloadyour server log files. Check you logs for IP's calling suspicious files or attempting POST commands to non-form's. Notify your host and work with them to clean up the site, and to make sure there are no back doors to your site or hire a professional to help Restore yourwebsitewith a clean backup copy. EnsureJoomla and your extensions are all using the latest versions.
  • 16. DatabasePasswords Changingyour super adminpassword in MySQL Go to adamek.biz/md5-generator.php
  • 17.
  • 18. Then browse the Super Admin record you want to change
  • 19. Then paste your new MD5 encrypted password into the password field.
  • 20.
  • 21. Full security audit services are available for your Joomla website. Visit http://joomlashowroom.com

Editor's Notes

  1. Changing this prefix will prevent most exploits. If your site is already set up you can use a tool called “EasySQL” to change your current database prefix.Creating a new super administrator will also create a new user ID. Hackers already know 2/3rds of your original Super Admin information. They know the Username and User ID. They only need to figure out your Password.Turning off the editor site wide in the global configuration will prevent front end users from uploading and manipulating files from the front end. Just select NO EDITOR from the dropdown list.