Index: branches/5.0.x/core/install/step_templates/security.tpl
===================================================================
diff -u -r12199 -r12204
--- branches/5.0.x/core/install/step_templates/security.tpl (.../security.tpl) (revision 12199)
+++ branches/5.0.x/core/install/step_templates/security.tpl (.../security.tpl) (revision 12204)
@@ -1,7 +1,7 @@
-
%1$s |
+
+ %1$s |
';
$error_tpl = '
@@ -30,9 +30,8 @@
if (!$write_check) {
$output .= '
-
- For security reasons it\'s highly recommended to set 755 permissions on above files to prevent hacking attempts.
- |
+
+ For security reasons it\'s highly recommended to set 755 permissions on above files to prevent hackers from attacking your website!
|
';
}
@@ -52,23 +51,23 @@
unlink(WRITEABLE . '/install_check.php');
$execute_check = ($result !== 'OK');
- $output .= sprintf($heading_tpl, '
Ability to Execute PHP in Writable Folders', 'text');
+ $output .= sprintf($heading_tpl, 'Ability to Execute PHP in Writable Folders', 'text');
$status_text = $execute_check ? 'Secure' : 'Vulnerable';
$output .= sprintf($error_tpl, 'Result of creating and executing PHP file(s) in "/system" (or "/system/images") folder', $status_text);
if (!$execute_check) {
$output .= '
-
+ |
For security reasons it\'s highly recommended disable the access (execution) to PHP files within "/system" folder and it\'s subfolders.
|
You can do this by:
- - changing your "httpd.conf" file to deny requests for all "*.php" files;
- - renaming ".htaccess-sample" (located in "/system") to ".htaccess" so it overrides default Apache settings.
+ - changing your "httpd.conf" file to deny requests for all "*.php" files
+ - renaming ".htaccess-sample" (located in "/system") to ".htaccess" so it overrides default Apache settings
Note that "AllowOverride LIMIT" option should be enabled by your hosting provider.
|