Yesterday, I highlighted some of the critical Joomla security issues that you should consider. Here are a few more you should add to your list: All of these can be set within your local php.ini directory (if your server allows it), rather than manipulating the global one for the server. …
June, 2010
-
2 June
Joomla Security Tips
Joomla is a powerful free and open source content management system. It has become very popular, and many web hosting provider offer instant installer scripts that can automatically install Joomla onto a customer’s website. In certain, situations, however, you may prefer to install Joomla yourself. When you do, there are …
-
2 June
How to Display Files Modified Today
There are many ways to search Linux files and directories using grep, find, or locate. All of them find files that match certain search parameters, usually words or characters. On a Linux server, you can also find any files that were modified within the current day. This is useful for …
-
1 June
Nano vs Vi Text Editors
Linux server administration can be a challenge. Therefore, if you are new to it, you will want to make it as painless as possible. One tool you will inevitably use is a text editor. There are two popular choices: Vi and Nano. Vi is a favorite among coders and Linux …
May, 2010
-
31 May
Using the Stat Command to Display Metadata
Linux servers provide system administrators with a great deal of flexibility and information about the inner workings of the system. If you ever want to know about every minute detail of your hardware, Linux can do that. The same is also true of hardware. For general files, the “stat” command …
-
26 May
99% Uptime Guarantee
It seems as though nearly all web hosting providers promise 99% uptime. Therefore, the promise alone does not make the choice any easier. While there are sites that provide monitoring services that rate the actual uptime of hosts, the real question you should ask a web host is what the …
-
18 May
E-mail Address vs Contact Form
You want to make sure your website visitors can contact you, and you have made every effort to make sure they can find the “Contact Us” page, but what do you want to include on the page? Should you list your email addresses, have only a contact form, or provide …
-
17 May
Secure File Transfer from SSH
If you are accustomed to working with a graphical interface, such as Windows or Mac OS, having to manage your server from the command line can be arduous, but it is sometimes necessary. In some situations, for example, you might need to send a file directly from the server without …
-
17 May
When You Are Accused of Spamming…
Question: My web host has accused me of being a spammer and has suspended my account. How do I prove I am not a spammer? Answer: Usually, you will only be accused of spamming in one of three situations: (1) you actually are a spammer, (2) your account is hosted …
-
12 May
Creating Good Passwords
Whether you have a single small website or a data center filled with servers, security should always be at the top of your agenda. One of the most basic security holes that attackers often exploit is the weak password. It is important for you and any users on your server …