English English French French Spanish Spanish German German
Geekflare is supported by our audience. We may earn affiliate commissions from buying links on this site.
Share on:

Remove generator content Joomla Open Source Content Management

joomla 1
Invicti Web Application Security Scanner – the only solution that delivers automatic verification of vulnerabilities with Proof-Based Scanning™.

When you view the source code of the Joomla website, you will notice the following meta generator.

This comes default with Joomla!

<meta name="generator" content="Joomla! - Open Source Content Management" />

Did you ever wonder how to remove them?

Well, there are many ways to do that. I will show you the easiest one. You can do this without hacking code.

I came across Joomla Plugin – Bye Bye Generator, which will do your job.

Bye Bye Generator

Very tiny plugin to do precisely – remove Meta generate. You also have the option to rename a custom generator. This is compatible with Joomla 2.5 and 3.x

  • Download and Install Bye Bye Generator Plugin
  • Open the plugin from Plugin Manager
  • Click Remove next to the generator and publish it.
  • Refresh your Joomla website and verify with page source code

I tested and worked as expected!

On a mission to secure a Joomla site?

Check out security extension to protect from online vulnerabilities or consider using Cloud WAF.

Thanks to our Sponsors
More great readings on Joomla
Power Your Business
Some of the tools and services to help your business grow.
  • Invicti uses the Proof-Based Scanning™ to automatically verify the identified vulnerabilities and generate actionable results within just hours.
    Try Invicti
  • Web scraping, residential proxy, proxy manager, web unlocker, search engine crawler, and all you need to collect web data.
    Try Brightdata
  • Semrush is an all-in-one digital marketing solution with more than 50 tools in SEO, social media, and content marketing.
    Try Semrush
  • Intruder is an online vulnerability scanner that finds cyber security weaknesses in your infrastructure, to avoid costly data breaches.
    Try Intruder