SlideShare ist ein Scribd-Unternehmen logo
1 von 57
Downloaden Sie, um offline zu lesen
8 Most Popular Joomla! Hacks 

&

How To Avoid Them
Daniel Kanchev
@dvkanchev
Daniel Kanchev
@dvkanchev

Before we begin …
7+ Years of Joomla! experience
5 Years with SiteGround
Love FOSS
Addicted to extreme sports
SiteGround is the home
of 100,000 Joomla! sites
We face hundreds if not thousands
security attacks per day …
“Why would somebody hack me?”
Hackers don’t really care about your site. All they care is
to send some spam.
“Security is a not a product, but a
process”

If anybody tells you your site is unhackable, that guy is a liar!
1. Outdated Joomla! Core
Quick demo…
…of Joomla! file upload security bug
More info on the hack
•

All versions before 3.1.5 and 2.5.14
are vulnerable

•

Can be executed by anybody, no
admin rights needed

•

The attacker can obtain full access to
Joomla! and its surrounding
userspace
More info on the hack
Joomla!!
http://goo.gl/8YwZIk!
!

Sucuri!
http://goo.gl/WjLKGm!
!

SiteGround!
http://goo.gl/NWkZTz
UPDATE! UPDATE! UPDATE!
Use software to get notified and
update Joomla! Core
Admin Tools
https://www.akeebabackup.com/products/admintools.html
!
!
!

Watchful.li
https://watchful.li/features/
SiteGround offers Joomla! Auto
Update
Read security bulletins
!

Joomla! Security News:!
http://feeds.joomla.org/JoomlaSecurityNews
!

Sucuri:!
http://blog.sucuri.net/?s=joomla
2. Extensions
Here’s a Scenario:
•

Your site is up to date

•

Your extensions are up to date

•

But you still get hacked…

•

Wonder why?
Extension vulnerabilities
•

Sometimes when vulnerability in an extension is
found, it takes the extension developers too
much time to fix it.

•

Therefore it’s always good to use a WAF!

•

WAF = Web Application Firewall
Popular WAFs
SiteGround adds more than 200 mod_sec
rules every week.
Example mod_sec rule

# 30.Sep.2013
# joomla com_seminar Cross site scripting Vulnerability
# http://cxsecurity.com/issue/WLB-2013090184
SecFilterSelective REQUEST_FILENAME "index.php" "chain,id:00680"
SecFilterSelective ARG_option "com_seminar" chain
SecFilterSelective ARG_search "onmouseover"
CloudFlare and Incapsula are advanced
mod_security alike FREE services
which add a CDN functionality.
More Security Bulletins

Joomla! Extensions Security News:!
!

http://feeds.joomla.org/JoomlaSecurityVulnerableExtensions
3. Themes
“Templates are software, not just a bunch of graphics.
Template developers do release security upgrades all the
time. Make sure you install them. I've seen many sites getting
hacked because of a dated template with a SQL injection or
XSS vulnerability.”

-Nicholas Dionysopoulos
Example
RocketTheme SQL injection in their modules!
!

http://www.rockettheme.com/blog/extensions/1300-important-securityvulnerability-fixed
!
WAF is good for themes too!
4. Weak passwords
Let me tell you a story…
On April 9th we got hit by a huge brute
force attack towards many Joomla!s
Bots used more than a thousand
different IPs per server to scan for
passes…

… and we blocked more than 92,000 IPs in total across our
network in just
In 12 hours we blocked more than 15
million login requests
But still, we thought many passwords were guessed
We then tried to brute force our clients
ourselves.
And we were shocked how many passwords we found.
Over 40% of our customers used
Really Weak passwords.
Let me show you how easy it is to
guess a dumb password, say:
“pass123”
Username is admin
So in less than 10 seconds I’ve got
your password
Tip: Change your password to a full
sentence - it’s easy to remember and hard
to guess like:
!

“I love to watch the sunset.”
Tip 2: Change your
username!
admin2 is not acceptable too ;) Try with:
!

yourname_@dm1n
Tip 3: Additionally secure your
administrator login page
•

Allow access only from certain IP addresses

•

Add Captcha

•

Password protect the administrator folder

•

Use secret URL parameters
5. Outdated Server Software
Old PHP 5.3 running as CGI
remote execution exploit
http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/
Quick demo…
Make sure your server side software is
current at all times.
6. Incorrectly configured server
software
Apache Symlinks bug
http://seclists.org/fulldisclosure/2013/Aug/81

The Problem:
public_html/fred.txt —> /home/otheracct/public_html/configuration.php

The Solution:
Add to httpd.conf or .htaccess file: SymLinksIfOwnerMatch
7. Joomla! Permissions
Correct Joomla! Permissions set
•

Folders: 755

•

Files: 644

•

configuration.php: 444
Incorrect Joomla! Permissions set
•

All: 777

•

Anything more than: 755
It’s a must to have account
isolation, when hosted on shared.
8. Malware
Viruses and Trojans steal your
login details.
Stay up to date on anti-virus
software.
So let’s recap…
•

Update your Joomla!

•

Update your extensions. Read security bulletins ones in a while.

•

Update your themes. Don’t forget that!

•

Use strong passwords and non default admin usernames.

•

Make sure your server side software is current (PHP, Apache, MySQL)

•

Make sure your server side software is correctly setup

•

Use correct file permissions for Joomla!

•

Watch up for that sneaky malware
Questions?
Thank you!
!

70% OFF HOSTING DISCOUNT
!

http://www.siteground.com/webinar

Weitere ähnliche Inhalte

Was ist angesagt?

Building Secure WordPress Sites
Building Secure WordPress Sites Building Secure WordPress Sites
Building Secure WordPress Sites Catch Themes
 
The moment my site got hacked - WordCamp Sofia
The moment my site got hacked - WordCamp SofiaThe moment my site got hacked - WordCamp Sofia
The moment my site got hacked - WordCamp SofiaMarko Heijnen
 
How to Secure your WordPress Website - WordCamp UK 2014
How to Secure your WordPress Website - WordCamp UK 2014How to Secure your WordPress Website - WordCamp UK 2014
How to Secure your WordPress Website - WordCamp UK 2014Primary Image Ltd
 
Beginning WordPress Security WordCamp North Canton 2015
Beginning WordPress Security WordCamp North Canton 2015Beginning WordPress Security WordCamp North Canton 2015
Beginning WordPress Security WordCamp North Canton 2015Michele Butcher-Jones
 
Joomla wireframing Template - Joomladay Netherlands 2014 #jd14nl
Joomla wireframing Template - Joomladay Netherlands 2014 #jd14nlJoomla wireframing Template - Joomladay Netherlands 2014 #jd14nl
Joomla wireframing Template - Joomladay Netherlands 2014 #jd14nlPhilip Locke
 
WordPress Site Management - Keeping Your Creation Happy, Healthy and Secure
WordPress Site Management - Keeping Your Creation Happy, Healthy and SecureWordPress Site Management - Keeping Your Creation Happy, Healthy and Secure
WordPress Site Management - Keeping Your Creation Happy, Healthy and SecureMeagan Hanes
 
Introduction to Backups and Security
Introduction to Backups and SecurityIntroduction to Backups and Security
Introduction to Backups and SecuritySuzette Franck
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012Angela Bowman
 
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri
 
Word campktm speed-security
Word campktm speed-securityWord campktm speed-security
Word campktm speed-securityDigamber Pradhan
 
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)Hardening WordPress - SAScon Manchester 2013 (WordPress Security)
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)Bastian Grimm
 
Technical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 editionTechnical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 editionOtto Kekäläinen
 
10 things I’ve learnt about web application security
10 things I’ve learnt about web application security10 things I’ve learnt about web application security
10 things I’ve learnt about web application securityJames Crowley
 
WordPress security for everyone
WordPress security for everyoneWordPress security for everyone
WordPress security for everyoneVladimír Smitka
 
Sucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri
 
Locking Down Your WordPress Site
Locking Down Your WordPress SiteLocking Down Your WordPress Site
Locking Down Your WordPress SiteFrank Corso
 
Securing Word Press Blog
Securing Word Press BlogSecuring Word Press Blog
Securing Word Press BlogChetan Gole
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITEAcodez IT Solutions
 

Was ist angesagt? (20)

Building Secure WordPress Sites
Building Secure WordPress Sites Building Secure WordPress Sites
Building Secure WordPress Sites
 
The moment my site got hacked - WordCamp Sofia
The moment my site got hacked - WordCamp SofiaThe moment my site got hacked - WordCamp Sofia
The moment my site got hacked - WordCamp Sofia
 
How to Secure your WordPress Website - WordCamp UK 2014
How to Secure your WordPress Website - WordCamp UK 2014How to Secure your WordPress Website - WordCamp UK 2014
How to Secure your WordPress Website - WordCamp UK 2014
 
Beginning WordPress Security WordCamp North Canton 2015
Beginning WordPress Security WordCamp North Canton 2015Beginning WordPress Security WordCamp North Canton 2015
Beginning WordPress Security WordCamp North Canton 2015
 
Joomla wireframing Template - Joomladay Netherlands 2014 #jd14nl
Joomla wireframing Template - Joomladay Netherlands 2014 #jd14nlJoomla wireframing Template - Joomladay Netherlands 2014 #jd14nl
Joomla wireframing Template - Joomladay Netherlands 2014 #jd14nl
 
WordPress Site Management - Keeping Your Creation Happy, Healthy and Secure
WordPress Site Management - Keeping Your Creation Happy, Healthy and SecureWordPress Site Management - Keeping Your Creation Happy, Healthy and Secure
WordPress Site Management - Keeping Your Creation Happy, Healthy and Secure
 
Introduction to Backups and Security
Introduction to Backups and SecurityIntroduction to Backups and Security
Introduction to Backups and Security
 
Locking down word press
Locking down word pressLocking down word press
Locking down word press
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012
 
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNs
 
Word campktm speed-security
Word campktm speed-securityWord campktm speed-security
Word campktm speed-security
 
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)Hardening WordPress - SAScon Manchester 2013 (WordPress Security)
Hardening WordPress - SAScon Manchester 2013 (WordPress Security)
 
Technical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 editionTechnical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 edition
 
10 things I’ve learnt about web application security
10 things I’ve learnt about web application security10 things I’ve learnt about web application security
10 things I’ve learnt about web application security
 
WordPress security for everyone
WordPress security for everyoneWordPress security for everyone
WordPress security for everyone
 
Sucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! website
 
Locking Down Your WordPress Site
Locking Down Your WordPress SiteLocking Down Your WordPress Site
Locking Down Your WordPress Site
 
Securing Word Press Blog
Securing Word Press BlogSecuring Word Press Blog
Securing Word Press Blog
 
WordPress Security 101
WordPress Security 101WordPress Security 101
WordPress Security 101
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
 

Ähnlich wie 8 Most Popular Joomla Hacks & How To Avoid Them

8 Most Common Joomla! Hacks and How to Avoid Them
8 Most Common Joomla! Hacks and How to Avoid Them8 Most Common Joomla! Hacks and How to Avoid Them
8 Most Common Joomla! Hacks and How to Avoid ThemDaniel Kanchev
 
OWASP Thailand 2016 - Joomla Security
OWASP Thailand 2016 - Joomla Security OWASP Thailand 2016 - Joomla Security
OWASP Thailand 2016 - Joomla Security Akarawuth Tamrareang
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015kriptonium
 
Presentation on Top 10 Vulnerabilities in Web Application
Presentation on Top 10 Vulnerabilities in Web ApplicationPresentation on Top 10 Vulnerabilities in Web Application
Presentation on Top 10 Vulnerabilities in Web ApplicationMd Mahfuzur Rahman
 
EN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdf
EN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdfEN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdf
EN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdfGiorgiRcheulishvili
 
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Mr. Mohammed Aldoub  - A case study of django web applications that are secur...Mr. Mohammed Aldoub  - A case study of django web applications that are secur...
Mr. Mohammed Aldoub - A case study of django web applications that are secur...nooralmousa
 
Case Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by DefaultCase Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by DefaultMohammed ALDOUB
 
Secrets to a Hack-Proof Joomla Revealed
Secrets to a Hack-Proof Joomla RevealedSecrets to a Hack-Proof Joomla Revealed
Secrets to a Hack-Proof Joomla RevealedSiteGround.com
 
How to secure web applications
How to secure web applicationsHow to secure web applications
How to secure web applicationsMohammed A. Imran
 
Hack & Fix, Hands on ColdFusion Security Training
Hack & Fix, Hands on ColdFusion Security TrainingHack & Fix, Hands on ColdFusion Security Training
Hack & Fix, Hands on ColdFusion Security TrainingColdFusionConference
 
Secure programming with php
Secure programming with phpSecure programming with php
Secure programming with phpMohmad Feroz
 
Are you ready to be hacked?
Are you ready to be hacked?Are you ready to be hacked?
Are you ready to be hacked?Daniel Kanchev
 
Making Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itMaking Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itTim Plummer
 
Fix me if you can - DrupalCon prague
Fix me if you can - DrupalCon pragueFix me if you can - DrupalCon prague
Fix me if you can - DrupalCon praguehernanibf
 
Seven steps to better security
Seven steps to better securitySeven steps to better security
Seven steps to better securityMichael Pignataro
 

Ähnlich wie 8 Most Popular Joomla Hacks & How To Avoid Them (20)

8 Most Common Joomla! Hacks and How to Avoid Them
8 Most Common Joomla! Hacks and How to Avoid Them8 Most Common Joomla! Hacks and How to Avoid Them
8 Most Common Joomla! Hacks and How to Avoid Them
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
OWASP Thailand 2016 - Joomla Security
OWASP Thailand 2016 - Joomla Security OWASP Thailand 2016 - Joomla Security
OWASP Thailand 2016 - Joomla Security
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
Presentation on Top 10 Vulnerabilities in Web Application
Presentation on Top 10 Vulnerabilities in Web ApplicationPresentation on Top 10 Vulnerabilities in Web Application
Presentation on Top 10 Vulnerabilities in Web Application
 
EN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdf
EN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdfEN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdf
EN - BlackHat US 2009 favorite XSS Filters-IDS and how to attack them.pdf
 
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Mr. Mohammed Aldoub  - A case study of django web applications that are secur...Mr. Mohammed Aldoub  - A case study of django web applications that are secur...
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
 
Case Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by DefaultCase Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by Default
 
Secrets to a Hack-Proof Joomla Revealed
Secrets to a Hack-Proof Joomla RevealedSecrets to a Hack-Proof Joomla Revealed
Secrets to a Hack-Proof Joomla Revealed
 
How to secure web applications
How to secure web applicationsHow to secure web applications
How to secure web applications
 
Hack & Fix, Hands on ColdFusion Security Training
Hack & Fix, Hands on ColdFusion Security TrainingHack & Fix, Hands on ColdFusion Security Training
Hack & Fix, Hands on ColdFusion Security Training
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
 
Secure programming with php
Secure programming with phpSecure programming with php
Secure programming with php
 
Are you ready to be hacked?
Are you ready to be hacked?Are you ready to be hacked?
Are you ready to be hacked?
 
Making Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itMaking Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking it
 
Brendon Hatcher Joomla Security
Brendon Hatcher Joomla SecurityBrendon Hatcher Joomla Security
Brendon Hatcher Joomla Security
 
Fix me if you can - DrupalCon prague
Fix me if you can - DrupalCon pragueFix me if you can - DrupalCon prague
Fix me if you can - DrupalCon prague
 
Agility Requires Safety
Agility Requires SafetyAgility Requires Safety
Agility Requires Safety
 
Joomla spécialiste
Joomla spécialisteJoomla spécialiste
Joomla spécialiste
 
Seven steps to better security
Seven steps to better securitySeven steps to better security
Seven steps to better security
 

Mehr von SiteGround.com

Accessibilità digitale: come rendere un sito web accessibile a tutti
Accessibilità digitale: come rendere un sito web accessibile a tuttiAccessibilità digitale: come rendere un sito web accessibile a tutti
Accessibilità digitale: come rendere un sito web accessibile a tuttiSiteGround.com
 
WhatsApp Marketing: cos’è e come farlo nel modo giusto
WhatsApp Marketing: cos’è e come farlo nel modo giustoWhatsApp Marketing: cos’è e come farlo nel modo giusto
WhatsApp Marketing: cos’è e come farlo nel modo giustoSiteGround.com
 
Come usare e ottimizzare le immagini per il web
Come usare e ottimizzare le immagini per il webCome usare e ottimizzare le immagini per il web
Come usare e ottimizzare le immagini per il webSiteGround.com
 
5 cose da sapere per fare un sito responsive su WordPress
5 cose da sapere per fare un sito responsive su WordPress5 cose da sapere per fare un sito responsive su WordPress
5 cose da sapere per fare un sito responsive su WordPressSiteGround.com
 
Black Friday: 10 consigli per fare promozioni e migliorare il tuo eCommerce
Black Friday: 10 consigli per fare promozioni e migliorare il tuo eCommerceBlack Friday: 10 consigli per fare promozioni e migliorare il tuo eCommerce
Black Friday: 10 consigli per fare promozioni e migliorare il tuo eCommerceSiteGround.com
 
Attacchi informatici: cosa sono e come funzionano
Attacchi informatici: cosa sono e come funzionanoAttacchi informatici: cosa sono e come funzionano
Attacchi informatici: cosa sono e come funzionanoSiteGround.com
 
Google Analytics 4: affrontare il cambiamento senza sforzi
Google Analytics 4: affrontare il cambiamento senza sforziGoogle Analytics 4: affrontare il cambiamento senza sforzi
Google Analytics 4: affrontare il cambiamento senza sforziSiteGround.com
 
Yoast SEO: trucchi e consigli per sfruttarlo al meglio
Yoast SEO: trucchi e consigli per sfruttarlo al meglioYoast SEO: trucchi e consigli per sfruttarlo al meglio
Yoast SEO: trucchi e consigli per sfruttarlo al meglioSiteGround.com
 
Webinar SITEGROUNG VENDERE ONLINE.pdf
Webinar SITEGROUNG  VENDERE ONLINE.pdfWebinar SITEGROUNG  VENDERE ONLINE.pdf
Webinar SITEGROUNG VENDERE ONLINE.pdfSiteGround.com
 
Cookieless World: La Marketing Automation a supporto del business online
Cookieless World: La Marketing Automation a supporto del business onlineCookieless World: La Marketing Automation a supporto del business online
Cookieless World: La Marketing Automation a supporto del business onlineSiteGround.com
 
È meglio la SEO on-page o la SEO off-page?
È meglio la SEO on-page o la SEO off-page?È meglio la SEO on-page o la SEO off-page?
È meglio la SEO on-page o la SEO off-page?SiteGround.com
 
Analytics: Trasforma il tuo sito in uno strumento di business
Analytics: Trasforma il tuo sito in uno strumento di businessAnalytics: Trasforma il tuo sito in uno strumento di business
Analytics: Trasforma il tuo sito in uno strumento di businessSiteGround.com
 
Come e perché ottimizzare il proprio sito per i Core Web Vitals
Come e perché ottimizzare il proprio sito per i Core Web VitalsCome e perché ottimizzare il proprio sito per i Core Web Vitals
Come e perché ottimizzare il proprio sito per i Core Web VitalsSiteGround.com
 
SEM: il centravanti del tuo Marketing Online
SEM: il centravanti del tuo Marketing OnlineSEM: il centravanti del tuo Marketing Online
SEM: il centravanti del tuo Marketing OnlineSiteGround.com
 
10 plugin fondamentali per migliorare il tuo sito WooCommerce
10 plugin fondamentali per migliorare il tuo sito WooCommerce10 plugin fondamentali per migliorare il tuo sito WooCommerce
10 plugin fondamentali per migliorare il tuo sito WooCommerceSiteGround.com
 
Ottimizzazione e gestione WordPress: Azioni semplici per risultati immediati
Ottimizzazione e gestione WordPress: Azioni semplici per risultati immediatiOttimizzazione e gestione WordPress: Azioni semplici per risultati immediati
Ottimizzazione e gestione WordPress: Azioni semplici per risultati immediatiSiteGround.com
 
Crea fantastiche landing page con il nuovo editor WordPress
Crea fantastiche landing page con il nuovo editor WordPressCrea fantastiche landing page con il nuovo editor WordPress
Crea fantastiche landing page con il nuovo editor WordPressSiteGround.com
 
Personal Branding: strategie digitali per il marketing personale
Personal Branding: strategie digitali per il marketing personalePersonal Branding: strategie digitali per il marketing personale
Personal Branding: strategie digitali per il marketing personaleSiteGround.com
 
Le 10 domande più frequenti su WordPress (e le 10 risposte)
Le 10 domande più frequenti su WordPress (e le 10 risposte)Le 10 domande più frequenti su WordPress (e le 10 risposte)
Le 10 domande più frequenti su WordPress (e le 10 risposte)SiteGround.com
 
Local marketing e Local SEO. Conoscere e utilizzare Google per aumentare le v...
Local marketing e Local SEO. Conoscere e utilizzare Google per aumentare le v...Local marketing e Local SEO. Conoscere e utilizzare Google per aumentare le v...
Local marketing e Local SEO. Conoscere e utilizzare Google per aumentare le v...SiteGround.com
 

Mehr von SiteGround.com (20)

Accessibilità digitale: come rendere un sito web accessibile a tutti
Accessibilità digitale: come rendere un sito web accessibile a tuttiAccessibilità digitale: come rendere un sito web accessibile a tutti
Accessibilità digitale: come rendere un sito web accessibile a tutti
 
WhatsApp Marketing: cos’è e come farlo nel modo giusto
WhatsApp Marketing: cos’è e come farlo nel modo giustoWhatsApp Marketing: cos’è e come farlo nel modo giusto
WhatsApp Marketing: cos’è e come farlo nel modo giusto
 
Come usare e ottimizzare le immagini per il web
Come usare e ottimizzare le immagini per il webCome usare e ottimizzare le immagini per il web
Come usare e ottimizzare le immagini per il web
 
5 cose da sapere per fare un sito responsive su WordPress
5 cose da sapere per fare un sito responsive su WordPress5 cose da sapere per fare un sito responsive su WordPress
5 cose da sapere per fare un sito responsive su WordPress
 
Black Friday: 10 consigli per fare promozioni e migliorare il tuo eCommerce
Black Friday: 10 consigli per fare promozioni e migliorare il tuo eCommerceBlack Friday: 10 consigli per fare promozioni e migliorare il tuo eCommerce
Black Friday: 10 consigli per fare promozioni e migliorare il tuo eCommerce
 
Attacchi informatici: cosa sono e come funzionano
Attacchi informatici: cosa sono e come funzionanoAttacchi informatici: cosa sono e come funzionano
Attacchi informatici: cosa sono e come funzionano
 
Google Analytics 4: affrontare il cambiamento senza sforzi
Google Analytics 4: affrontare il cambiamento senza sforziGoogle Analytics 4: affrontare il cambiamento senza sforzi
Google Analytics 4: affrontare il cambiamento senza sforzi
 
Yoast SEO: trucchi e consigli per sfruttarlo al meglio
Yoast SEO: trucchi e consigli per sfruttarlo al meglioYoast SEO: trucchi e consigli per sfruttarlo al meglio
Yoast SEO: trucchi e consigli per sfruttarlo al meglio
 
Webinar SITEGROUNG VENDERE ONLINE.pdf
Webinar SITEGROUNG  VENDERE ONLINE.pdfWebinar SITEGROUNG  VENDERE ONLINE.pdf
Webinar SITEGROUNG VENDERE ONLINE.pdf
 
Cookieless World: La Marketing Automation a supporto del business online
Cookieless World: La Marketing Automation a supporto del business onlineCookieless World: La Marketing Automation a supporto del business online
Cookieless World: La Marketing Automation a supporto del business online
 
È meglio la SEO on-page o la SEO off-page?
È meglio la SEO on-page o la SEO off-page?È meglio la SEO on-page o la SEO off-page?
È meglio la SEO on-page o la SEO off-page?
 
Analytics: Trasforma il tuo sito in uno strumento di business
Analytics: Trasforma il tuo sito in uno strumento di businessAnalytics: Trasforma il tuo sito in uno strumento di business
Analytics: Trasforma il tuo sito in uno strumento di business
 
Come e perché ottimizzare il proprio sito per i Core Web Vitals
Come e perché ottimizzare il proprio sito per i Core Web VitalsCome e perché ottimizzare il proprio sito per i Core Web Vitals
Come e perché ottimizzare il proprio sito per i Core Web Vitals
 
SEM: il centravanti del tuo Marketing Online
SEM: il centravanti del tuo Marketing OnlineSEM: il centravanti del tuo Marketing Online
SEM: il centravanti del tuo Marketing Online
 
10 plugin fondamentali per migliorare il tuo sito WooCommerce
10 plugin fondamentali per migliorare il tuo sito WooCommerce10 plugin fondamentali per migliorare il tuo sito WooCommerce
10 plugin fondamentali per migliorare il tuo sito WooCommerce
 
Ottimizzazione e gestione WordPress: Azioni semplici per risultati immediati
Ottimizzazione e gestione WordPress: Azioni semplici per risultati immediatiOttimizzazione e gestione WordPress: Azioni semplici per risultati immediati
Ottimizzazione e gestione WordPress: Azioni semplici per risultati immediati
 
Crea fantastiche landing page con il nuovo editor WordPress
Crea fantastiche landing page con il nuovo editor WordPressCrea fantastiche landing page con il nuovo editor WordPress
Crea fantastiche landing page con il nuovo editor WordPress
 
Personal Branding: strategie digitali per il marketing personale
Personal Branding: strategie digitali per il marketing personalePersonal Branding: strategie digitali per il marketing personale
Personal Branding: strategie digitali per il marketing personale
 
Le 10 domande più frequenti su WordPress (e le 10 risposte)
Le 10 domande più frequenti su WordPress (e le 10 risposte)Le 10 domande più frequenti su WordPress (e le 10 risposte)
Le 10 domande più frequenti su WordPress (e le 10 risposte)
 
Local marketing e Local SEO. Conoscere e utilizzare Google per aumentare le v...
Local marketing e Local SEO. Conoscere e utilizzare Google per aumentare le v...Local marketing e Local SEO. Conoscere e utilizzare Google per aumentare le v...
Local marketing e Local SEO. Conoscere e utilizzare Google per aumentare le v...
 

Kürzlich hochgeladen

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Kürzlich hochgeladen (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

8 Most Popular Joomla Hacks & How To Avoid Them