Securing your HACKED joomla website.

Posted on January 12th, 2014

Posted By | Comments

In the previous article I told you about securing your ‘wordpress website’ from hackers and in this article I am going to write about how can you secure your JOOMLA website.



First of all check If EDENHOST.COM is hosting your website and if yes then you can get your website free by asking through ticket to restore your website to the previous date, by doing this you can also gain your lost data.





1. Getting started

Firstly we will  scan the system for malware, it will help to secure the website from possible threats and for scanning please use a good anti-virus so that you get a proper  full machine scan for virus & malware.


2. Change password

Change passwords for the blog ADMINISTRATOR, your FTP and MySQL users and DO NOT forget to send reminder to all the users to change the password.



3. Upgrade!

Now upgrade your website installation to the latest software and also upgrade your  themes and plugins. Older versions are more prone to hacks. search for the plugins and themes whose updates are not available or discontinued by the producers and eliminates such themes and plugins.

NOTE :- Remember to change the password again after the up gradation.


4. Improve security

Now once we have successfully recovered website, we are going to improve security and for doing so you have to remove all unused plugins and themes and then install latest security and back up plugins to secure your website against hacking and regular back ups.


5. Protect directories and files

Increase the security of the critical configuration.php file by moving it outside of the public_html directory. For more information contact FAQ.

Ensure that all configurable paths to writable or uploadable directories (document repositories, image galleries, caches) are outside of public_html. Check third party extensions such as DOCMan and Gallery2 for editable paths to writable directories.

Joomla 1.5Joomla 2.5Joomla 3.x In the Back-End Global Configuration, change the log path. Some extensions use the built in JLog class. This will, by default write logs to http://yousite/logs. Change this to a place that a casual browser cannot find (and don’t pick /tmp/), or lock it down with http authentication. Because we are dealing with Open Source software, attackers can read the code of third-party extensions and may be able to guess log file names.

Joomla 1.5Joomla 2.5Joomla 3.x In the Back-End Global Configuration, change the temp folder path.

If the log and temp paths are changed and PHP open_basedir configuration directive is set, make sure that the new paths fall within the scope of open_basedir.

There is currently no easy way to move the Joomla! /image and /media directories. This is because thousands of third party extensions expect to find these important directories at the current location. The best plan is to make sure open_basedir is properly set for all the user accounts on your server.


6. Turn Register Globals Emulation OFF

Joomla 1.0 Turn Joomla’s Register Globals Emulation OFF. Although this setting is somewhat safer than PHP register_globals, you are much better off avoiding such settings all together (as well as any applications that require them). On pre-1.0.13 versions of Joomla, this setting is found in the globals.php file. As of version 1.0.13, it can be turned off in the Back-end, under Global Settings.

Joomla 1.5Joomla 2.5Joomla 3.x Joomla 1.5 and greater, does not use register globals, and in fact has smart code to defeat this setting even if it’s turned on at the PHP level. Note that although this makes Joomla itself safer, any server with register globals turned on is potentially vulnerable.


If you need any further details or help you can always contact us through tickets and please do not forget to share/like the article.

About -