• Home
  • Tips & Tricks
  • Joomla add-ons
  • Hacking Joomla!
  • Web Links
Home Tags SEO - Joomla!® Tips

CGI

  • Resource Injection

    This attack consists of changing resource identifiers used by an application in order to perform a malicious task. When an application permits a user input to define a resource, like a file name or port number, this data can be manipulated to execute or access different resources.

... also in this category

  • Style your tooltips
  • RFI/LFI
  • How to Create SEF URL's for ChronoForms with sh404SEF (or any other SEF component)
  • How to install Joomla 3.x Quickly!
  • How to "Patch Test" Joomla! code : Introduction

Related items

  • How an author can submit a story?
  • The 301 redirect
  • Botnet
  • What the alias field is for?
  • A hidden gem - the Modal script shipped with Joomla

Tags Cloud

Google Analytics template override field type search URL robots Google module SSL alias GPL custom field clean a hacked site popup CGI optimization mambot Windows CSS multilanguage

feed-image Rss Feed
  • Sitemap
  • Privacy statement
Error: unable to save our links to cache. Please make sure that the folder cache/automaticbacklinks_cache located in the folder /home/joomlati/public_html and is writable

Popular Tips

  • Moving the location of Admin login - reloaded
  • Contact images in the contact Category table
  • jtablesession::Store Failed - DB function failed with error number 1062
  • You are not authorised to view this resource
  • Save Failed with the Following Error: Invalid Parent ID

Latest Tips

  • RFI/LFI
  • VirtueMart's SMTP problems
  • SQL Injection
  • Help! I'm Locked Out Of My Site!
  • Load module position in component layout template

Site Statistics

Users 499

Articles 319

Articles View Hits 6850347

Today 1093

Yesterday 1097

Week 2190

Month 18218

All 4865497

Currently are 908 guests and no members online

Kubik-Rubik Joomla! Extensions

Designed by webGóbé
Scroll To Top