Shiny Grimer
Active member
- Pronoun
- she/her, they/them
To be honest, I know absolutely nothing about website security other than coding Guestbooks in PHP is a bad idea because a malicious person could post and execute another script through it. That is the extent of my knowledge about cyber security and even that is probably faulty.
I would like to know what steps can be taken to increase my website's security. There isn't anything interactive about my website at the moment - I have so little visitors, and they've likely all left considering the domain expired and I'm waiting until it's released again to buy. However, I want to take all the steps necessary.
In addition, what are some good, secure forums? I would like to add a forum to my site in the future, and I don't want a forum that is easily hacked (the Cutenews thing really made me worry considering how widespread it is).
This is just extra at this point, but I would also like to know the forms in which a virus can come. I know they can be encoded or wrapped into Mp3s and MPEGs, but I don't know how they function or how this is possible. I've heard the stories about how simply viewing a folder with the corrupted folder can allow for remote control of a system. This kind of thing really freaks me out, and I want to be prepared and be able to recognize something like that if I see it.
Thanks to anyone who responds.
I would like to know what steps can be taken to increase my website's security. There isn't anything interactive about my website at the moment - I have so little visitors, and they've likely all left considering the domain expired and I'm waiting until it's released again to buy. However, I want to take all the steps necessary.
In addition, what are some good, secure forums? I would like to add a forum to my site in the future, and I don't want a forum that is easily hacked (the Cutenews thing really made me worry considering how widespread it is).
This is just extra at this point, but I would also like to know the forms in which a virus can come. I know they can be encoded or wrapped into Mp3s and MPEGs, but I don't know how they function or how this is possible. I've heard the stories about how simply viewing a folder with the corrupted folder can allow for remote control of a system. This kind of thing really freaks me out, and I want to be prepared and be able to recognize something like that if I see it.
Thanks to anyone who responds.