-
Book Overview & Buying
-
Table Of Contents
Mastering Joomla! 1.5 Extension and Framework Development Second Edition
Whether or not we like to think about it, there is always the potential threat of an attacker gaining access to our Joomla! websites. The most common way in which security is breached in Joomla! is through third-party extension security flaws.
Due to the number of extensions that have security defects, there is an official list of extensions that are considered insecure; it is available in the FAQ sections at http://help.joomla.org.
It is very important that, as third-party extension developers, we take great care in making our extensions as secure as we can. In this section we will investigate some of the more common forms of attack and how we can prevent them from affecting our extensions, and we will take a look at how we can deal with users whom we believe to be attackers.
The security flaws that we will investigate are some of the most likely to be exploited because they tend to be the easiest to initiate, and there is plenty of literature explaining...
Change the font size
Change margin width
Change background colour