• 1
  • 2
  • 3
  • 4

Preset Styles

The Style Settings panel in the Gantry based theme administration interface provides several options for configuring the main built in stylistic aspects of the template.

Style

Gantry also provides the ability for you to create your own custom presets based on any parameter in the theme administrator. You should determine which parameters you wish to configure to be a part of the presets.


Assigning a Style

With Gantry, the ability to assign a certain style to an individual page has never been easier and/or more efficient. Just follow these simple steps:

  • Go to Extensions → Template Manager → rt_metropolis → Assignments → *Menu Item*
  • Select your preset from Show Presets, configure and save.

After setting your defaults to the desired values, select the Menu Items button and choose the menu item you wish to modify the parameters for. You will then see a series of checkboxes on the left of all the supported parameters.

Select the checkbox next to the parameter you wish to modify, it will then become active, and you can modify as you wish. Clicking “Save” in the toolbar will then save this configuration.

Gantry Framework: Style Configuration
  • Security Training
  • Are you hacked? Get helpTop
  • Security AuditingMore

Web security Training

TRAINING FROM   30th – 31st May 2014

Twiga Hosting Ltd is the ICT security training provider in Tanzania.
Currently 80% of websites and web applications are vulnerable to security threats including the government’s and non-government’s websites.:  Web security Training

Target: ‘Chief Executive Officers, Directors, Managers, Lawyers, ICT specialists, System administrators & other officers in the organizations.'

Facilitator: Train will be facilitated by experienced resource people with in-depth knowledge in information security. more info>>


If you are a victim of being hacked in your website or web system applications do not get heartbroken or getting the cost of developing the new applications.
 
Twiga Hosting Ltd through our highly experienced experts in preventing the websystems attacks can revive your original application. Please Contact us when you need our assistance. more info>>

Inadequate auditing in website and web applications  is a problem that many Web developers are facing. Perhaps it is lack of standards security auditing.

Twiga Hosting Ltd come up with the solution to solve those issues by establishing a standard auditing procedures by which we measure your security, by testing  your own Web site's authentication scheme and see how it stands the hacking attacks.

more info>>

Help & Tips

  • Cross Site Scripting (XSS) +

    Cross Site Scripting(XSS) is common web application vulnerability occur when an attacker uses a web application to send malicious code.
  • Outdated Programs Exploitation +

    Hackers uses security vulnerability in old version systems for exploitation.
  • Cookie/Session Hijacking +

    The attacker capture a valid “Session ID”, then he uses the token session to gain unauthorized access to the Web Server without user-name or password.  
  • Phishing +

    Phishing is the act of attempting to acquire users private information such as credit card details by pretending as legitimate entity in an electronic communication.  
  • SQL Injection Attacks +

    SQL Injection attacks are attacks aimed at exploiting databases. This lead to operating system attack and take over control.
  • Shell Scripts Upload +

    This is uploading malicious script to web server and use the shell to exploit the whole server.
  • Brute Force/Dictionary Attack +

    A dictionary attack uses a targeted technique of successively trying all the words in an exhaustive list called a dictionary (from a pre-arranged list of values)
  • 1
  • 2

Testimonials

ADVANCE TRAINING FOR PREVENTING WEBSITES AND WEB SYSTEMS FROM HACKING ATTACKS

  • Main types of websites and web systems attacks.
  • Solutions for preventing websites and web applications from being hacked.
  • Common mistakes in web technology that introduces security holes in
      websites and web systems.
  • How Hackers Detect existence of security holes in Websites or Web systems