Book Image

Mastering Mambo : E-Commerce, Templates, Module Development, SEO, Security, and Performance

By : Christian Wenz, Tobias Hauser
Book Image

Mastering Mambo : E-Commerce, Templates, Module Development, SEO, Security, and Performance

By: Christian Wenz, Tobias Hauser

Overview of this book

<p>Mambo is a PHP-based Open Source CMS. Mambo is both easy to use at the entry level for creating basic websites, while having the power and flexibility to support complex web applications. <br /> <br /> Mambo implements the core requirements of a full featured CMS. It has a powerful and extensible templating system with the ability to upload and manage many different data types. User access control, content approval, rich administrative control, content display scheduling are all built-in. New features and extensions are constantly added to the core system, with many more being available and supported by the community.<br /> <br /> Most of the Mambo development team now works on a fork of Mambo known as Joomla. Mastering Mambo is fully compatible with Joomla's 1.0 release.</p>
Table of Contents (18 chapters)
Mastering Mambo
Credits
About the Authors
Preface
Index

Keeping the System Up to Date


One last important aspect regarding security is the maintenance of the system itself. The best example of that is the Code Red computer worm, which exploited a weak point in the Windows web server IIS (at that time it was still called Internet Information Service) and spread really quickly. Naturally, Microsoft carries a lot of the blame for that. The server was susceptible and was installed and updated as the default with many Windows versions. Even worse, the problem had been recognized and repaired; a patch was available for it 18 months before Code Red attacked. There are numerous similar examples. Naturally there are also Zero Day Exploits (malicious code, which exploits a security gap and is published simultaneously with the announcement of the gap), but a lot of adversity could have been prevented, if administrators and end users had taken care of their security updates in time. For instance, Microsoft did not repair one weak point in Windows until...