SlideShare una empresa de Scribd logo
1 de 44
Descargar para leer sin conexión
JoomlaSecurity,[object Object],Bare essentials to serious measures,[object Object],Brendon Hatcher,[object Object],Technical Director,[object Object],Photo: flickr.com/photos/carbonnyc,[object Object]
Understanding     hackers and                 hacking,[object Object],Definitions of “hacker”,[object Object],Hacker’s motivations,[object Object],Evidence of hacking,[object Object]
What is a hacker?,[object Object],Someone who deliberately seeks to bypass a server’s security,[object Object],Black, grey, white hats,[object Object],A hacked site is a broken/compromised site,[object Object],A skilled computer programmer,[object Object],A hacked site is a tweaked and improved site,[object Object],A script kiddie,[object Object],Junior hacker using otherhacker’s tools and techniques,[object Object]
Hacker’s motivations,[object Object],To see if they can,[object Object],To create mayhem,[object Object],For social standing in the sub-culture,[object Object],For political reasons – hacktivism,[object Object],For financial reasons,[object Object],Theft – steal ebooks, videos, games, online services etc,[object Object],Sell data – user profiles, credit card details etc,[object Object],Industrial sabotage - paid to break competitor sites,[object Object],Set up zombie farms,[object Object],Steal bandwidth,[object Object],Host phishing pages,[object Object],Collect passwords,[object Object]
Evidence of hacking,[object Object],None!,[object Object],Site trashed,[object Object],Hacking message,[object Object],High bandwidth use,[object Object],Changed admin password,[object Object],New user with admin rights,[object Object],Server logs,[object Object]
Why be concernedabout security?,[object Object],No-one is safe ,[object Object],Hacking is actually quite easy,[object Object],Fixing hacked sites is tricky,[object Object],Hacked sites are a big problem ,[object Object]
No-one is safe,[object Object]
Why worry about hacking? ,[object Object],Sites are targeted at random,[object Object],Hacking is actually quite easy,[object Object],Vulnerable sites are easy to find,[object Object],Vulnerable sites are easy to hack,[object Object],Fixing hacked sites is quite tricky,[object Object],Hacks can be invisible,[object Object],Clients may not notice a hacked site for some time,[object Object],Finding a clean backup may be impossible,[object Object],Determining what has been done can be really hard,[object Object],May be difficult to restore,[object Object],Hardening site to avoid future hacks requires skill and focus,[object Object]
Why worry about hacking? ,[object Object],Hacked sites are a big problem,[object Object],Business reputation,[object Object],Angry clients,[object Object],Site shutdown by host,[object Object],Loss of business,[object Object],Data theft,[object Object],Photo: flickr.com/photos/gaetanlee/,[object Object]
Hacking aJoomla site,[object Object],Is Joomla less secure than other systems?,[object Object],The site must be vulnerable,[object Object],3 steps to hacking for fun and profit,[object Object]
Is Joomla less secure than other systems?,[object Object],Yes and No,[object Object],Joomla has to strike a balance between security and ease of use,[object Object],Joomla an attractive target for hackers,[object Object],The critical mass of sites,[object Object],Large amateur web developer user base ,[object Object],Extensions have variable security,[object Object],The site must be vulnerable,[object Object]
3 steps to hacking for fun and profit,[object Object],Find a vulnerability (and instructions on how to exploit it),[object Object],Find a vulnerable site,[object Object],Hack the site,[object Object],Then, sit back and enjoy fame and fortune!,[object Object]
,[object Object],Find a vulnerability,[object Object],Security sites,[object Object],www.exploit-db.com, www.secunia.com,[object Object],Various hacking sites/forums,[object Object],Joomlavulnerable extensions list,[object Object],docs.joomla.org/Vulnerable_Extensions_List,[object Object]
,[object Object],Find a vulnerable site,[object Object],Google Dork - a search phrase to find vulnerable sites,[object Object],PHPInfo,[object Object],intitle:phpinfo(),[object Object],Vulnerable extensions,[object Object],allinurl:com_acajoom,[object Object]
,[object Object],Cut and paste hack code,[object Object],http://xxxxxxxxxxxxxxxxx/index.php?option=com_acajoom&act=mailing&task=view&listid=1&Itemid=1&mailingid=1/**/union/**/select/**/1,1,1,1,concat(username,0x3a,password),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1/**/from/**/jos_users/**/LIMIT/**/1,1/*,[object Object],Photo: flickr.com/photos/tawheedmanzoor,[object Object]
Securityaction plan,[object Object],Web sites are like onions,[object Object],Levels of security,[object Object],Web development tools,[object Object],Strong, unique passwords everywhere,[object Object],Continuous attention,[object Object]
Web sites arelike onions,[object Object],Server operating system,[object Object],Apache,[object Object],PHP + MySQL,[object Object],[object Object]
Extensions
Users and their behaviour,[object Object]
Web development tools,[object Object],WHM – server administration,[object Object],cPanel – hosting account administration,[object Object],FileZilla – FTP app,[object Object],Keepass – password vault,[object Object]
General advice,[object Object],Strong, unique passwords everywhere,[object Object],A password vault removes the need to have a single, simple password,[object Object],Continuous attention needed,[object Object]
Creating a safehome for Joomla,[object Object],Shared, VPS or dedicated servers?,[object Object],Apache,[object Object],PHP,[object Object],MySQL,[object Object]
Shared, VPS or dedicated servers?,[object Object],A shared server,[object Object],Your site(s) live in the same hosting space as other sites that you do not administer,[object Object],This is the cheapest hosting option.  ,[object Object],No say over the security of the other sites on the server,[object Object],Old shared server is the worst location for your hosting,[object Object],A Virtual Private Server,[object Object],Better than shared,[object Object],Still can’t change many settings,[object Object]
Shared, VPS or dedicated servers?,[object Object],A dedicated server,[object Object],Still a “shared” server,[object Object],Allow you to upgrade and tweak all the settings on a dedicated server,[object Object],Host retains responsibility for maintenance,[object Object]
Additional security,[object Object],Suhosin – hardens PHP,[object Object],Samhain or Tripwire,[object Object],Configserver firewall,[object Object]
Apache,[object Object],[3] suExec,[object Object],CGI scripts run under the user of the website instead of the Apache user,[object Object],[3] Mod_security,[object Object],Intrusion detection and prevention engine,[object Object]
PHP,[object Object],[2] PHP5, not PHP4,[object Object],[3] suPHP,[object Object],PHP files are run under the user of the website instead of the Apache user,[object Object],Globally reset all files,[object Object],Owner – AccountUsername:AccountUsernamechown -R user:group *,[object Object],Files – 644find . -type f -exec chmod 644 {} ,[object Object],Folders – 755find . -type d -exec chmod 755 {} ,[object Object]
Hosting account,[object Object],.htaccess files,[object Object],[1] Activate the htaccess file in the Joomla root,[object Object],[1] Use an .htpasswd for the /administrator/ folder,[object Object],[3] Advanced .htaccess files,[object Object],A LOT more important detail in the manual,[object Object]
Keeping up to date,[object Object],Avoiding the obvious,[object Object],Hide, and be very, very quiet,[object Object],Spam form submissions,[object Object],Install sh404SEF,[object Object],,[object Object],Securing aJoomla site,[object Object]
Keeping up to date,[object Object],Must update Joomla core and extensions,[object Object],Remove unused extensions,[object Object]
Avoiding the obvious,[object Object],[1] The default database extension is jos_,[object Object],[1] The default admin username is admin,[object Object],[1] The default admin user ID is 62,[object Object],[1] Change administrator access URL,[object Object]
Hide, and be very, very quiet,[object Object],[1] SEF all URLs,[object Object],[1] Clear the default Joomlametatags,[object Object],[1] Clear the default Home page title,[object Object],[1] Remove generator tag,[object Object],[1] Change favicon,[object Object],[2] Hide component credits,[object Object]
Spam form submissions,[object Object],Trying to inject spam content onto your site,[object Object],Targets Joomla core forms and extension forms,[object Object],Install a captcha system,[object Object]
Install sh404SEF,[object Object],SEF URLS hide from Google Dorks,[object Object],Flood control,[object Object],Other security settings,[object Object]
Creating a safe working environment,[object Object],PC vulnerability to hacks,[object Object],FTP access hacks,[object Object],A note about users,[object Object],“Burglar bars, electric fences, alarms…and a key left under the doormat”,[object Object]
PC vulnerability to hacks,[object Object],[1] Install all operating system patches,[object Object],[1] Install all application system patches,[object Object],[1] Run comprehensive real-time protection apps,[object Object],[1] Install Secunia PSI,[object Object],[1] Secure your PC login,[object Object],[1] Secure your backup storage ,[object Object],[2] Use a secure web browser,[object Object]
FTP access hacks,[object Object],If a hacker can obtain your FTP password, they can login as you, bypassing almost every security barrier.,[object Object],FTP passwords are stored unencrypted in your FTP program!	,[object Object],FTP authentication details pass unencrypted to the server!,[object Object],There are several common FTP apps that store their passwords in a standard location with a standard name!,[object Object]
FTP configuration,[object Object],[1] cPanel setup,[object Object],Make sure that the FTP password is strong,[object Object],[1] PC setup,[object Object],Password vault (LastPass , Keepass ) to store the strong password,[object Object],Make sure passwords are not stored anywhere else (including on a Post-It note on the side of the PC),[object Object],[1] FileZilla,[object Object],Copy all passwords to the password vault ,[object Object],Delete all passwords from the Site Manager,[object Object],Set FileZilla to run in Kiosk mode,[object Object]
FTP configuration,[object Object],[2] Joomla,[object Object],Remove the FTP details from the configuration file,[object Object],[3] WHM,[object Object],Disable FTP access and allow only SFTP access,[object Object],A note about users,[object Object],You should ideally create separate user accounts for each staff member,[object Object]
Preparing forthe worst,[object Object],Site monitoring,[object Object],A disaster recovery plan,[object Object],Joomla site backups,[object Object],Restoring a hacked site,[object Object]
Site monitoring,[object Object],Diagnostics,[object Object],Site down,[object Object],Home page content changes,[object Object],Mod_security logs (shows attempts),[object Object],Bandwidth use,[object Object],Spam blacklisting,[object Object],[3] Searching and browsing server logs,[object Object]
Disaster Recovery Plan,[object Object],Depending on how central your web site is to your business, you may need a DRP,[object Object],See Tom Canavan’s presentation,[object Object],http://www.slideshare.net/coffeegroup/tom-canavan-joomla-security-and-disaster-recovery,[object Object],Photo: flickr.com/photos/28481088@N00,[object Object]
Joomla site backups,[object Object],Long-cycle Joomla backups are critical,[object Object],Redundant backups lead to restful sleep,[object Object],See my Joomla for Web Developer talk for MUCH more detail,[object Object]
Restoring a hacked site,[object Object],Fixes the obvious problems ,[object Object],Does not address:,[object Object],Hidden hacks,[object Object],Shell scripts,[object Object],Backdoors,[object Object],Zombies,[object Object],Continuing vulnerabilities,[object Object],Impacts of data exposure,[object Object],Photo: flickr.com/photos/andreweason,[object Object]

Más contenido relacionado

Destacado

Introducing Joomla! 3.2 - Something new for everyone! (Keynote)
Introducing Joomla! 3.2 - Something new for everyone! (Keynote)Introducing Joomla! 3.2 - Something new for everyone! (Keynote)
Introducing Joomla! 3.2 - Something new for everyone! (Keynote)Joomla Day South Africa
 
Chris Rault - Content construction with ZOO
Chris Rault - Content construction with ZOOChris Rault - Content construction with ZOO
Chris Rault - Content construction with ZOOJoomla Day South Africa
 
Primera guerra mundial
Primera guerra mundialPrimera guerra mundial
Primera guerra mundialccartefacto
 
Implementing and running Joomla at a large South African university
Implementing and running Joomla at a large South African universityImplementing and running Joomla at a large South African university
Implementing and running Joomla at a large South African universityJoomla Day South Africa
 
Yellowfin Business Intelligence (BI) platform
Yellowfin Business Intelligence (BI) platformYellowfin Business Intelligence (BI) platform
Yellowfin Business Intelligence (BI) platformJoomla Day South Africa
 
Beck bob - take back your power
Beck bob - take back your powerBeck bob - take back your power
Beck bob - take back your powerCostin Serban
 
Number worksheets
Number worksheetsNumber worksheets
Number worksheetsasher45
 
Complexity Simplified? (Seblod CCK walk through)
Complexity Simplified? (Seblod CCK walk through)Complexity Simplified? (Seblod CCK walk through)
Complexity Simplified? (Seblod CCK walk through)Joomla Day South Africa
 
Rubab rauf mba from tuf
Rubab rauf mba from tufRubab rauf mba from tuf
Rubab rauf mba from tufSumaira Aslam
 
Peter Van Westen - Mastering Module Magic
Peter Van Westen - Mastering Module MagicPeter Van Westen - Mastering Module Magic
Peter Van Westen - Mastering Module MagicJoomla Day South Africa
 
01 pengantar-tik
01 pengantar-tik01 pengantar-tik
01 pengantar-tikAnisa AzaCh
 

Destacado (14)

Hulda
HuldaHulda
Hulda
 
Leaked! Confessions of a Joomla DEV
Leaked! Confessions of a Joomla DEVLeaked! Confessions of a Joomla DEV
Leaked! Confessions of a Joomla DEV
 
Introducing Joomla! 3.2 - Something new for everyone! (Keynote)
Introducing Joomla! 3.2 - Something new for everyone! (Keynote)Introducing Joomla! 3.2 - Something new for everyone! (Keynote)
Introducing Joomla! 3.2 - Something new for everyone! (Keynote)
 
Chris Rault - Content construction with ZOO
Chris Rault - Content construction with ZOOChris Rault - Content construction with ZOO
Chris Rault - Content construction with ZOO
 
Primera guerra mundial
Primera guerra mundialPrimera guerra mundial
Primera guerra mundial
 
Implementing and running Joomla at a large South African university
Implementing and running Joomla at a large South African universityImplementing and running Joomla at a large South African university
Implementing and running Joomla at a large South African university
 
Yellowfin Business Intelligence (BI) platform
Yellowfin Business Intelligence (BI) platformYellowfin Business Intelligence (BI) platform
Yellowfin Business Intelligence (BI) platform
 
Youtube Analytics Google+
Youtube Analytics Google+Youtube Analytics Google+
Youtube Analytics Google+
 
Beck bob - take back your power
Beck bob - take back your powerBeck bob - take back your power
Beck bob - take back your power
 
Number worksheets
Number worksheetsNumber worksheets
Number worksheets
 
Complexity Simplified? (Seblod CCK walk through)
Complexity Simplified? (Seblod CCK walk through)Complexity Simplified? (Seblod CCK walk through)
Complexity Simplified? (Seblod CCK walk through)
 
Rubab rauf mba from tuf
Rubab rauf mba from tufRubab rauf mba from tuf
Rubab rauf mba from tuf
 
Peter Van Westen - Mastering Module Magic
Peter Van Westen - Mastering Module MagicPeter Van Westen - Mastering Module Magic
Peter Van Westen - Mastering Module Magic
 
01 pengantar-tik
01 pengantar-tik01 pengantar-tik
01 pengantar-tik
 

Similar a Brendon Hatcher Joomla Security

Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015kriptonium
 
OWASP Thailand 2016 - Joomla Security
OWASP Thailand 2016 - Joomla Security OWASP Thailand 2016 - Joomla Security
OWASP Thailand 2016 - Joomla Security Akarawuth Tamrareang
 
8 Most Common Joomla! Hacks and How to Avoid Them
8 Most Common Joomla! Hacks and How to Avoid Them8 Most Common Joomla! Hacks and How to Avoid Them
8 Most Common Joomla! Hacks and How to Avoid ThemDaniel Kanchev
 
WordPress Security Hardening
WordPress Security HardeningWordPress Security Hardening
WordPress Security HardeningTimothy Wood
 
8 Most Popular Joomla Hacks & How To Avoid Them
8 Most Popular Joomla Hacks & How To Avoid Them8 Most Popular Joomla Hacks & How To Avoid Them
8 Most Popular Joomla Hacks & How To Avoid ThemSiteGround.com
 
Joomla Security v3.0
Joomla Security v3.0Joomla Security v3.0
Joomla Security v3.0Ajay Lulia
 
Neo word press meetup ehermits - how to keep your blog from being hacked 2012
Neo word press meetup   ehermits - how to keep your blog from being hacked 2012Neo word press meetup   ehermits - how to keep your blog from being hacked 2012
Neo word press meetup ehermits - how to keep your blog from being hacked 2012Brian Layman
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security PresentationAndrew Paton
 
Joomladay Netherlands - Security
Joomladay Netherlands - SecurityJoomladay Netherlands - Security
Joomladay Netherlands - SecurityWilco Jansen
 
Making Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itMaking Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itTim Plummer
 
Complete Wordpress Security By CHETAN SONI - Cyber Security Expert
Complete Wordpress Security By CHETAN SONI - Cyber Security ExpertComplete Wordpress Security By CHETAN SONI - Cyber Security Expert
Complete Wordpress Security By CHETAN SONI - Cyber Security ExpertChetan Soni
 
Seven steps to better security
Seven steps to better securitySeven steps to better security
Seven steps to better securityMichael Pignataro
 
Cloud Computing Security Essay
Cloud Computing Security EssayCloud Computing Security Essay
Cloud Computing Security EssayLaura Ochoa
 
Security misconfiguration
Security misconfigurationSecurity misconfiguration
Security misconfigurationJiri Danihelka
 

Similar a Brendon Hatcher Joomla Security (20)

Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
Joomla Security
Joomla  SecurityJoomla  Security
Joomla Security
 
Joomla Security
Joomla SecurityJoomla Security
Joomla Security
 
Avoid Getting Hacked! Presentation on Joomla! Web Security
Avoid Getting Hacked! Presentation on Joomla! Web Security Avoid Getting Hacked! Presentation on Joomla! Web Security
Avoid Getting Hacked! Presentation on Joomla! Web Security
 
OWASP Thailand 2016 - Joomla Security
OWASP Thailand 2016 - Joomla Security OWASP Thailand 2016 - Joomla Security
OWASP Thailand 2016 - Joomla Security
 
8 Most Common Joomla! Hacks and How to Avoid Them
8 Most Common Joomla! Hacks and How to Avoid Them8 Most Common Joomla! Hacks and How to Avoid Them
8 Most Common Joomla! Hacks and How to Avoid Them
 
WordPress Security Hardening
WordPress Security HardeningWordPress Security Hardening
WordPress Security Hardening
 
8 Most Popular Joomla Hacks & How To Avoid Them
8 Most Popular Joomla Hacks & How To Avoid Them8 Most Popular Joomla Hacks & How To Avoid Them
8 Most Popular Joomla Hacks & How To Avoid Them
 
Joomla spécialiste
Joomla spécialisteJoomla spécialiste
Joomla spécialiste
 
Joomla Security v3.0
Joomla Security v3.0Joomla Security v3.0
Joomla Security v3.0
 
Neo word press meetup ehermits - how to keep your blog from being hacked 2012
Neo word press meetup   ehermits - how to keep your blog from being hacked 2012Neo word press meetup   ehermits - how to keep your blog from being hacked 2012
Neo word press meetup ehermits - how to keep your blog from being hacked 2012
 
WordPress security
WordPress securityWordPress security
WordPress security
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security Presentation
 
Joomladay Netherlands - Security
Joomladay Netherlands - SecurityJoomladay Netherlands - Security
Joomladay Netherlands - Security
 
Making Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itMaking Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking it
 
Complete Wordpress Security By CHETAN SONI - Cyber Security Expert
Complete Wordpress Security By CHETAN SONI - Cyber Security ExpertComplete Wordpress Security By CHETAN SONI - Cyber Security Expert
Complete Wordpress Security By CHETAN SONI - Cyber Security Expert
 
Seven steps to better security
Seven steps to better securitySeven steps to better security
Seven steps to better security
 
Cloud Computing Security Essay
Cloud Computing Security EssayCloud Computing Security Essay
Cloud Computing Security Essay
 
Security misconfiguration
Security misconfigurationSecurity misconfiguration
Security misconfiguration
 

Más de Joomla Day South Africa

Joomla! 101 - Getting started & Finding help (level: Beginner)
Joomla! 101 - Getting started & Finding help (level: Beginner)Joomla! 101 - Getting started & Finding help (level: Beginner)
Joomla! 101 - Getting started & Finding help (level: Beginner)Joomla Day South Africa
 
Case Study: AGOA.info - Planning and Execution, then disaster... / SEEDINIT.o...
Case Study: AGOA.info - Planning and Execution, then disaster... / SEEDINIT.o...Case Study: AGOA.info - Planning and Execution, then disaster... / SEEDINIT.o...
Case Study: AGOA.info - Planning and Execution, then disaster... / SEEDINIT.o...Joomla Day South Africa
 
Case Study Upgrading Joomlagov.info to Joomla 2.5 with responsive design
Case Study  Upgrading Joomlagov.info to Joomla 2.5 with responsive design Case Study  Upgrading Joomlagov.info to Joomla 2.5 with responsive design
Case Study Upgrading Joomlagov.info to Joomla 2.5 with responsive design Joomla Day South Africa
 
Streamlining Joomla Template Deployment and Updates across multiple installat...
Streamlining Joomla Template Deployment and Updates across multiple installat...Streamlining Joomla Template Deployment and Updates across multiple installat...
Streamlining Joomla Template Deployment and Updates across multiple installat...Joomla Day South Africa
 
Successful Joomla migrations that don't hurt Search Engine Rankings
Successful Joomla migrations that don't hurt Search Engine RankingsSuccessful Joomla migrations that don't hurt Search Engine Rankings
Successful Joomla migrations that don't hurt Search Engine RankingsJoomla Day South Africa
 
Peter Van Westen - No Number Power Squared
Peter Van Westen - No Number Power SquaredPeter Van Westen - No Number Power Squared
Peter Van Westen - No Number Power SquaredJoomla Day South Africa
 
Brendon Hatcher Joomla for web developers
Brendon Hatcher Joomla for web developersBrendon Hatcher Joomla for web developers
Brendon Hatcher Joomla for web developersJoomla Day South Africa
 
Yannick Gaultier - sh404SEF SEO and Analytics
Yannick Gaultier - sh404SEF SEO and AnalyticsYannick Gaultier - sh404SEF SEO and Analytics
Yannick Gaultier - sh404SEF SEO and AnalyticsJoomla Day South Africa
 

Más de Joomla Day South Africa (13)

Joomla! 101 - Getting started & Finding help (level: Beginner)
Joomla! 101 - Getting started & Finding help (level: Beginner)Joomla! 101 - Getting started & Finding help (level: Beginner)
Joomla! 101 - Getting started & Finding help (level: Beginner)
 
Case Study: AGOA.info - Planning and Execution, then disaster... / SEEDINIT.o...
Case Study: AGOA.info - Planning and Execution, then disaster... / SEEDINIT.o...Case Study: AGOA.info - Planning and Execution, then disaster... / SEEDINIT.o...
Case Study: AGOA.info - Planning and Execution, then disaster... / SEEDINIT.o...
 
Case Study Upgrading Joomlagov.info to Joomla 2.5 with responsive design
Case Study  Upgrading Joomlagov.info to Joomla 2.5 with responsive design Case Study  Upgrading Joomlagov.info to Joomla 2.5 with responsive design
Case Study Upgrading Joomlagov.info to Joomla 2.5 with responsive design
 
Streamlining Joomla Template Deployment and Updates across multiple installat...
Streamlining Joomla Template Deployment and Updates across multiple installat...Streamlining Joomla Template Deployment and Updates across multiple installat...
Streamlining Joomla Template Deployment and Updates across multiple installat...
 
Welcome to JoomlaDay Cape Town 2012
Welcome to JoomlaDay Cape Town 2012Welcome to JoomlaDay Cape Town 2012
Welcome to JoomlaDay Cape Town 2012
 
Successful Joomla migrations that don't hurt Search Engine Rankings
Successful Joomla migrations that don't hurt Search Engine RankingsSuccessful Joomla migrations that don't hurt Search Engine Rankings
Successful Joomla migrations that don't hurt Search Engine Rankings
 
Joomla SEO
Joomla SEOJoomla SEO
Joomla SEO
 
Peter Van Westen - No Number Power Squared
Peter Van Westen - No Number Power SquaredPeter Van Westen - No Number Power Squared
Peter Van Westen - No Number Power Squared
 
Simon Dowdles - Seblod CCK
Simon Dowdles - Seblod CCKSimon Dowdles - Seblod CCK
Simon Dowdles - Seblod CCK
 
Brendon Hatcher Joomla for web developers
Brendon Hatcher Joomla for web developersBrendon Hatcher Joomla for web developers
Brendon Hatcher Joomla for web developers
 
Brendon Hatcher Joomla Distros
Brendon Hatcher Joomla DistrosBrendon Hatcher Joomla Distros
Brendon Hatcher Joomla Distros
 
Yannick Gaultier - sh404SEF SEO and Analytics
Yannick Gaultier - sh404SEF SEO and AnalyticsYannick Gaultier - sh404SEF SEO and Analytics
Yannick Gaultier - sh404SEF SEO and Analytics
 
Case Study: How we Built Joomlagov.info
Case Study: How we Built  Joomlagov.infoCase Study: How we Built  Joomlagov.info
Case Study: How we Built Joomlagov.info
 

Último

activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 

Último (20)

activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 

Brendon Hatcher Joomla Security

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.

Notas del editor

  1. Balaclava - http://www.flickr.com/photos/vladus/1933814881/
  2. Pickpocket - http://www.flickr.com/photos/dullhunk/4575707721/
  3. Onion - http://www.flickr.com/photos/10460483@N02/5448093522/
  4. Shhh - http://www.flickr.com/photos/42918851@N00/5905346604/sizes/l/in/photostream/
  5. http://www.flickr.com/photos/philliecasablanca/6011248010/