For IT security when it comes to implementation of firewall, the planning comes first. The base of planning is the security policy for your organization. The firewall should be capable enough to protect the LAN resources from harms on internet. In a recent article on introduction to firewalls, I discussed about firewall basics. Now I’m going to discuss about the desired security policy for the firewall implementation for your network.
Firewall is an important and extensive tool for IT security. Writing about firewalls in depth is one of my targets for this blog on IT security. So, to set the ball rolling I’ll start with the basics of firewalls . For today I’ll start the disucssion with firewall basics.
Am here today to write article on how to use joomla as forum. As in my previous article I have written about Joomla as Blog. Today am going to write How we will use joomla as forum , I would like to install the most popular forum software I have activated the Legacy Plugin in the Plugin Manager menu so this forum software can work properly.
Following are the features of FireBoard :
* User-defined nesting forum categories
* As many forums as you want with access rights
* User profiles and user avatars
* Upload of files and images for a forum entry
Setting Up a Forum
Here I will explain how to set up forum into joomla.
After the installation of Fireboard software, I will set up a category first, which will act as a container around the forums contained inside. After creating category, I will set up the actual forum, which I can then assign to that category.
The situation becomes even more dangerous when the suid/sgid programs are poorly written. e.g when suid programs are written, then at the run time the privileges are elevated. Now, if the programmer forgets to drop the privileges then the root privileges are retained by the program.
Am here today to discuss about the How to use JOOMLA as BLOG. Let’s start with difference between blog and joomla.
What is Blog ?
A blog is a type of website or part of a website. Blogs are usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse-chronological order.
What is Joomla?
Joomla is content management system (CMS), which enables you to build Web sites and powerful online applications.
According to above definition , Blog is a type of website or can be part of website but joomla is enriched with the content management system which is used to build web site. Its can not be part of website.
How to use Joomla! as Blog
Blogging is a great way to get more traffic to your site and communicate with the community interested in the same topics as you. Now am going to tell you how you can use joomla as blog for your site.
Following points need to considered for site as a blog :
How to structure Joomla! as a blog
Yesterday I wrote about Cache Manager in article Day-27.Today I will write on Purge Expired Cache next to Cache Manager under tools, What is Purge Expired Cache and how it works. Let’s start with the definition of Purge Cache Manager!
What is Purge Expired Cache?
Click on Tools menu at joomla administration backend and you will see Purge Expired Cache in sub menu. Click on this menu. You will see screen as shown below:
This tool will purge all expired cache files from the cache folders. Cache files which are still current are not purged.
* Because this process has to check each cache file individually, it is slower and requires more system resources than the Clean Cache option. However, once the purge process is complete, there should be no loss in speed for users of the site, because all current cache files are still available. In contrast, the Clean Cache option runs more quickly, since it just deletes all of the files in each cache folder. However, the website may be a little slower
There are very small things in linux based systems which often consfuse the users. Here in this article I’m going to discuss the specific use of find command and difference between exec and xargs.
Linux Security is greatly enhanced if authentication to the system is well under control. PAM plays a great role in this process. PAM expands to Pluggable Authentication Modules. I promise to explain PAM in as easy manner as I can. Just be ready to read forwards and you are done. Since the blog is tightly focussed on security of unix based system, so I assume the general basic knowledge of unix based operating systems.
If you’re new here, you may want to subscribe to my RSS feed. Thanks for visiting!Yesterday I wrote about Global Check – In in article Day-26. Today I will write on Cache Manager next to Global Check – In under tools , What is Cache Manager and how it works. Let’s start with the definition…
Linux Systems Security is growing concern. Here I’ve listed few measures to be taken for securing the linux systems. Ganesh Dutt Shama: World is Welcome To The World of Security!!!