Tuesday, 23 December 2014

Decoding the Secret Code for Joomla Security


Though Joomla is a well organized and secured content management system, still you need efforts to make it completely secured. Here are some methods that will be beneficial for the security purpose of Joomla. Now, let us decode all the secret methods:

Backup Of Website: As Joomla is dynamic content management software, it needs to store various data and thus needs a backup store for this. Now, when does the website needs a backup?



  • When you are installing new extension of Joomla 
  • When you are upgrading the current Joomla version 
  • When you have a regular backup strategy monthly, weekly or daily///

Hosting and Servers: The hosting and servers are very crucial items that need to be selected with efficiency. Some open ports or shared hosting may lead to various server errors. So, ensure that you are using a secured host. Then you need to run PHP 5.2 by hosting your site on the server. The PHP scripts help to filter the user accounts specifically and thus resulting in efficient security.

Use Of htaccess file: You need to rename the htaccess file from htaccess.txt to .htaccess and then place the file in your root folder. You may edit or rewrite the files as required. This particular activity will surely protect the security of Joomla.

Permissions and Specific User Accounts: The default username ‘admin’ should be changed to something else so that the hackers find difficulty in revealing the details of the accounts. There is a default rule where you need to change all your files to 644 and folders to 755. There may be some exceptions to this rule, but these will definitely come up with exceptional security.

Incident Management and Backup: Backups are required in every stage so that you do not lose any important data from your site; and by ‘incident management’ I basically mean a proper planning before your site gets hacked. Thus a well planned system will surely help you to restore all your lost data very quickly.

Extension Management: You need to prepare a thorough checking system for all the third party extensions. You can go through the code review of the extension or run a test suite. Finally you need to update the codes as and when required.

Managing Version Numbers: The extension version numbers need to be removed if required. You can use the version names only by editing them with tools like Dreamweaver.

Unused Files: There may be various incidents when you have installed software but ended up by not using it at all. The unused files need to be identified soon and uninstalled as and when required. They seem to be very vulnerable during the Joomla process.

Protection by Password: The conventional method of protecting through the password always comes handy. Brute Force can be the common virus that generally attacks feeble passwords. Just create a unique password with upper and lowercase letters and numbers. You can change the password every 30 days to ensure its security. You also need to protect the administrative folder of Joomla through strong passwords. The administrators may need to sign in twice for entering into a single account, but this will protect the software very efficiently.

Try HTPASSWD: This activity will surely help in the authentication of the user which is the combination of the Unix and Linux based web servers. You can manually create the .HTPASSWD file and the .HTACCESS file.

Using the CPanel For Security : You have to operate the CPanel using some simple steps for the protection purpose. At first, just log in to the CPanel , then select the Password protect directories. After that just navigate through Home/Myaccount/public_html/administration folder. After that, you can choose the administrative folder and fill up the folder name with username and password.

Applying The Security Extensions : For using the security extension of the Joomla, you need to log into the administrator of Joomla. Then navigate through components/admin tool/password protect administrator. You will have to insert the username and password finally.

Updating Add-Ons : You are required to update the Joomla and its extensions. You just need to enter into the administration section and select ‘update’ from the “components” and your CMS will automatically be updated.

Updating Extensions : Just choose the extension from the extensions manager and then the update tab. The ‘purge cache’ and the ‘Find updates’ are to be selected and then finally the extensions that you need to update.

Changing Table Prefix : The default table prefix needs to be changed regularly as the hackers target the database tables to gain access to the usernames and passwords. If you are using Joomla 1.5, then the DB admin can be a beneficial component for you. But if you are using the Joomla 1.6 version, then it will be better if you run the security process during the installation itself.

SSL Certification : You can easily use the SSL mode for logging into Joomla. You just need to ensure that you are having SSL certification for your own domain. If you are using any shared version of the SSL certification then your purpose may not be successfully fulfilled.

FTP Layer Of Joomla : You may shut down the FTP layer of Joomla for the third party extensions to process the function in a proper manner. You need to check that the layer is not saving your login details and passwords. The SuExec can be applied by the servers instead of the FTP layer.

Register Globals : The register global is not necessary and can be turned off. This will help to disable few active PHP scripts. Thus, you can edit the php.ini file from your domain in the root directory.

URLs Must Be Search Engine Friendly : Not only to make your site rank better in the search engine results, but the search engine friendly URLs will surely protect your domain from the hackers.

You need to be always updated with latest security changes and likewise protect your domain. Just be on top from all your competitors if you keep up your guards efficiently.






Author Bio
 Sarah Wilson is a well known professional Joomla expert who is sharing some useful tips and tricks for protecting your Joomla from the modern hackers. You can visit our blog and know more information about the Joomla security.


Sunday, 21 December 2014

Good Practices In Database Security



Databases are often the targets of security attacks by cyber criminals. Databases that hold all the security related information, passwords and financial details of users are what these attackers are looking to profit off. That is why database security is an incredibly complex topic that can be covered in elaborate detail. Get in touch with your remote DBA now.

However here are a few of the best practices in database security that will help businesses.


   1. Keep the database and the web servers separate.

Usually when the entire web related software is been installed, the database is automatically made. For the sake of convenience the database is made on the same server where the software has been loaded which is the web server. However this opens the doors for a security breach because then hackers will only need a single point of entry. If they are able to make their way past the security for the web server then all the data stored will be at their mercy.

This is why the database should be stored separately on server that is further protected by a firewall and not with the web server. It is a more intricate but well needed procedure. To know more visit - http://www.remotedba.com/


   2. File encryption

Just storing the database on a separate server is not enough to ward off persistent attacks. Encrypt all the files that are being stored. The stored files of the web software have the information that will enable it to connect to the databases. If you store the data in plain text files like a lot of people then they will provide the data that the hacker needs to get to the sensitive information.

It is not just the files that need to be encrypted. Encrypt the backup files too incase there is an internal attack.


   3. WAF

Use WAFs or web application firewalls. It isn’t true that the web server protection is completely separate or irrelevant to the database. A proper WAF will protect your website from cross site script vulnerabilities, vandalism and also potential SQL injection attacks. If SQL queries can be prevented from being injected by a criminal then the firewall will be successful in keeping all the sensitive information which is stored in a database away from unwanted attention and attacks.


   4. Current patches

This is one thing that a lot of web administrators like remote DBA fall short. Web sites which have a lot of third party apps, elements, widgets, plug-ins and other add-ones become easy targets to something that could have been patched on time.


   5. Less third party apps

Try and reduce the number of third party applications being used. While it is understandable to use user-interactive widgets and other content that makes websites attractive, any app that accesses the database is always a weak point which can be exploited. Unless it is required don’t use third party apps. Remember that these are made by programmers who then stop support after a while.


   6. No shared servers

If your database has highly sensitive information then don’t use a shared server if you can avoid it. It will be cheaper and easier. However remember that you are putting all your important data at the hands of someone else. In case you can’t avoid it, do a keen review of all their security protocol.


   7. Security controls

Put in security controls on your database. Check your controls and ensure that they have been enabled even though it is automatically enabled by most databases these days.


About the author

Trisha Ray is a database administrator for the past five years. She is also a remote DBA. Trisha loves cycling on the weekends.


Tuesday, 16 December 2014

Pocket Protection



Are you concerned about security on your mobile device? It's no secret that mobile users have been hacked in the past and had their personal information stolen. But is mobile security getting any better? Here are a few things you need to know about the current state of mobile security.

Apps Can Protect You Or Hurt You

Image via Flickr by William Hook
Many app developers understand the risks that occur by having a mobile device and using it to access different networks, files, and applications. That's why several trusted app developers have released security apps designed to warn you of dangers and to keep your data safe. For instance, the 360 Security - Antivirus&Boost app for Android is designed to protect your device from malware and viruses. Others like Find My iPhone will help you locate a lost or stolen device and even lock your smartphone so that thieves can't access your private data.


The downside to smartphone applications is that even though there are apps that can protect you, others can hurt you. For instance, you might think you're downloading a seemingly safe application when in reality there's a virus piggybacking on the download. Furthermore, top-rated apps may become prime targets for hackers, meaning that even the best apps aren't always completely safe.


The good news is that an increasing number of app developers are using encrypted data to keep your information further from the reach of hackers. For instance, the cloud storage service Spideroak encrypts data at every stage of the process, making it a bit safer than options like Dropbox that don't.

It's In the Fine Print

Before you download an app, be sure you're checking what the app has permission to access on your device. An application may not be damaging in the way that it installs malware and viruses without your consent. In fact, you may simply be giving the app permission to access your files. If an app does compromise your privacy, it could be because you've allowed it access to do so, though.


The good news is that in app stores like Google Play, you'll see a list of what the app is asking permission to access. You'll want to read through the full list before accepting the terms, so that you're not surprised later by how the app gains access to and uses your information.

File Sharing Raises Concerns

Mobile devices and their complementary cloud-based storage apps raise many concerns, particularly for businesses. The security threat here is that people are concerned that sharing files could lead other users to forward sensitive information. The further this information is distributed, the more vulnerable it is.


According to 2013 research into the state of mobile security, the second top concern with BYOD aka Bring Your Own Device was that users would be able to forward company data onto cloud-based storage services. This grave concern fell behind only that of lost or stolen devices.


It's clear how this may raise concerns for businesses allowing individuals to bring their own devices to work. As an individual, however, this should also be a concern. That's because even if you delete sensitive data on your device, such as photos, contact information, etc., it still survives on cloud storage services and on devices of anyone to whom you've forwarded the file. Even if you're the only one with the file, that digital data is never gone. Today, it's still a huge worry for many people about where the copies of their files are and how susceptible the information is to being breached.

The Bottom Line

While there are still a lot of concerns surrounding mobile security and the protection of your device -- including even physically protecting your phone from damage and water -- there have been improvements. For instance, more applications are taking security measures to encrypt their data and create constant updates to stay out of reach from hackers. In addition, operating systems like Google's Android 5.0 Lollipop OS are becoming more secure.



How do you feel about your device and its security?