How To Enable Legacy Mode

Table of contents:

How To Enable Legacy Mode
How To Enable Legacy Mode

Video: How To Enable Legacy Mode

Video: How To Enable Legacy Mode
Video: Legacy Boot | How to Enable Legacy to Boot from USB in HP Laptop 2024, April
Anonim

The Joomla site management system is one of the most popular and convenient. More than half a million sites have been created on this engine, and their number is constantly growing. Joomla allows you to create a website without knowledge of html-layout. As the versions of the control system change, sometimes the administrator needs to enable the plugin compatibility mode for earlier versions.

How to enable legacy mode
How to enable legacy mode

Instructions

Step 1

The need to enable legacy mode (compatibility mode) appears if any component, module or plugin refuses to work in the normal Native mode. Usually in this case the warning "You need to enable Legacy Mode" appears.

Step 2

To enable this mode, go to the control panel using the login and password obtained during registration. Once logged into your account, find the menu "Extensions" - "Plugin Manager". The number of plugins can be different, usually there are about twenty-five of them. Find the extension "System - Legacy Support" among them, it is at the end of the list. A disabled plugin is marked with a red cross, an enabled plugin is marked with a green checkmark.

Step 3

To enable an extension, check the box on the left and click the Enable button. There is another, simpler option to enable the plugin - just click on the red cross. Remember that the extension is slower in compatibility mode, so you should not use this mode unnecessarily.

Step 4

When working with Joomla, follow the security rules - this will save your site from hacking. In particular, change the database prefix to any arbitrary one. Without knowing the correct name of the database, a hacker will not be able to extract user data from it. Since changing the prefix has its own nuances, read about this procedure in specialized articles.

Step 5

Remove references to the version of the extensions. To do this, open the extension in a code editor and use the search option to find all the places where the plugin version is mentioned. Leave only the name of the plugin, remove the version. Always try to use the latest engine and extensions.

Step 6

If you installed an extension, but you didn’t like it and you don’t use it, do not leave it unpublished on the site. If there are vulnerabilities in this extension, a hacker can find a way to exploit them. Therefore, remove plugins you do not need.

Step 7

In the event that you manage the site from one computer and you have a static IP address, enable IP binding in the control settings. In this case, the hacker, even having received your credentials, will not be able to enter the administration panel, since his IP address will be different.

Recommended: