Solved

Safety and Security of a Homemade Content Management System

Posted on 2010-09-15
4
362 Views
Last Modified: 2012-05-10
What is the status on the safety and security of a homemade programmed CMS system?
We just had one made up for our website, and yesterday, someone, somehow got in and edited a page with arabic garbage.
We are trying to figure out if it's our system that wasn't secure enough, or is it those hackers who are strong enough?
where can I find out more information?
0
Comment
Question by:rivkamak
4 Comments
 
LVL 7

Expert Comment

by:whityum
ID: 33685509
you should get a programmer to look at the source code and servers, it could be anything from SQL injection, passwords that are too easy in the CMS or on the server, etc.
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 33685563
I agree.  If you're on shared hosting, see if the hosting company knows about any problems.  They often don't want to say but if you tell them, at least they'll know to look out for problems.
0
 

Author Comment

by:rivkamak
ID: 33685631
generally are homemade CMS systems safe?
0
 
LVL 14

Accepted Solution

by:
Designbyonyx earned 250 total points
ID: 33685709
Most CMS' out there started out as a homemade CMS... and the developer went on to build more features and distribute the code.

Most systems out there were built by competent programmers who know what they are doing.  It sounds like you saved some money on a mediocre programmer... or you are using a password that can be found in a dictionary or resembles some other form of commonly used password convention (such as ending in 123).

No system is completely safe... but if you have a truly custom CMS that got hacked... then it was most likely a bad code base.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Finding original email is quite difficult due to their duplicates. From this article, you will come to know why multiple duplicates of same emails appear and how to delete duplicate emails from Outlook securely and instantly while vital emails remai…
This article shows gives you an overview on SQL Server 2016 row level security. You will also get to know the usages of row-level-security and how it works
Via a live example, show how to backup a database, simulate a failure backup the tail of the database transaction log and perform the restore.
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now