Plone CMS: The Story of the FBI Hack, no matter what whether it's true or is a hoax which aims to advertise a useless exploit, has brought me curiosity. What is and what does this CMS do? What's the difference from the others?
Let's get it from the beginning.
Because I have already installed a LAMP system (the initials of Linux, Apache, MySQL, PHP), I did not think it much. I fell out because he took me even less. The installer of the Web application is standalone, ie it can set up the site on its own without even having the LAMP, or to say the AMP better.
I ran him installer on Linux (you will find it and for Windows but also for VirtualBox).
I will describe the installation on Linux:
You open a terminal in the folder that contains the installer and run the following commands:
tar-xf Plone-5.0.6-UnifiedInstaller-r1.tgz
cd Plone-5.0.6-UnifiedInstaller-r1
Let's start installing with options:
sudo ./install.sh $OPTION
The latest commands are for activating and stopping Plone CMS.
cd ~ / Plone / zinstance / bin / plonectl start
ή
cd ~ / Plone / zinstance bin / plonectl stop
You are ready, you can see the first page of Plone CMS at:
Then you can explore with your quiet setup
and the first page
At a glance I noticed that an application has unlimited possibilities and settings.
Take a look at a detail to understand why Plone CMS does not need AMP
The Plone uses ZODB database. ZODB stores Python objects with any attributes. So there is no need to write database schema or table descriptions as these are used in SQL systems. If data models are described in some way the descriptions are written in Python, usually using zope.schema packages.
This chapter is about the basics of ZODB, in conjunction with the ZODB database directly, such as the configuration database settings.
More information about ZODB
Of course I will report with her claim companyς που θέλει το Plone να είναι το πιο safe CMS στον κόσμο. Στην by clicking here they mention:
"The Plone CMS is one of the most secure website systems available. It is rare to have Common Vulnerability Exposures (CVE) published about Plone. A review of CVEs in the last 3 years for popular CMSs showed the following results with Plone being a clear winner with significantly fewer CVEs:
- Plone: 40
- Drupal: 409
- WordPress: 596
Source: National Vulnerability Database, February 2015 ″
They also forgot to mention the adoption-use rates of each platform. WordPress let's say it might have 596 vulnerabilities in 2015 but how many installed CMSs?
The high usability of each CMS makes it more visible to hackers and security researchers. Let's see now with the latest media reports that Plone's name became widely known how long she will be able to hold the title…
Due to the reports I write above I decided to install CMS, but only for educational purposes…