Server Security - Page 8
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The National Security Agency (NSA) recently published a report, "Best Practices for Keeping Your Home Network Secure" (PDF) in which it makes numerous recommendations designed to help home computer users avoid malware and other common problems.
Last issue we talked about the recent survey of IT managers concerning risk management in their enterprises conducted for Courion. Today we'll look at another recent survey which included IT managers -- and more.
Primarily a Windows article, but good general security ideas as well. "Glenn Phillips, president of Pelham, Ala.-based Fort
Hello, world! Today it's your Backup Day. World Backup Day is a new idea promoted by a small team of Redditors, and it's a good idea. You can never be too careful when it comes to backing up.
Here you are, adding yet another server to your virtualized environment that went from beta to production in the data center equivalent of zero to 60 in 4.5 seconds. That speed means the security policies and processes you routinely applied to physical servers probably went out the window over the past few years.
Thanks to Ars Technica and H-online.com, we now have intimate details of the Anonymous attack against security research company HBGary. There are no surprises in how the attacks where carried out, but we can draw many morals from the story, even if we've heard them time and time before.
Oh my God! There are security holes in Ubuntu 10.04! The sky is falling! Bill Gates is the maker of the one true operating system; forgive us Bill for we have worshiped at the feet of false Penguin idols. Oh please, give me a break!
According to the RSA 2011 Cybercrime Trends Report, the number one trend this year will be mobile device malware and the associated exploitation of mobile smart devices to commit fraud. The explosive growth of mobile smart devices as general purpose
At the ShmooCon hacker conference, security expert Jon Larimer from IBM's X-Force team demonstrated that Linux is far from immune from attacks via USB storage devices: during his presentation, the expert obtained access to a locked Linux system using a specially crafted USB flash drive, ...
The WordPress.org development team has released version 3.0.5 of its open source blogging and publishing platform, a maintenance and security update that addresses two vulnerabilities; these could have allowed a Contributor- or Author-level user to gain further access to the site.
Routing issues, slow network applications, DNS resolution problems -- a network administrator has to deal with a host of network nuisances on a daily basis. How do you survive when you're constantly under the gun to fix the problems? Like any other professional, you need a solid set of tools.
Half of U.S. government Web sites are vulnerable to commonplace DNS attacks because they haven't deployed a new authentication mechanism that was mandated in 2008, a new study shows.
Linus Torvalds is starting 2011 off with a bang with the release of the 2.6.37 Linux kernel. The new kernel is the first release since 2.6.36 debuted in October. The goal of the new 2.6.37 kernel is to provide developers with improved Linux performance, security and scalability.
Thanks to Mehran for sending this in. OpenBSD IPSEC stack has backdoor and due to that's first open source implementation of ipsec, some OSes have the same piece of code! Since we had the first IPSEC stack available for free, large parts of the code are now found in many other projects/products. Over 10 years, the IPSEC code has gone through many changes and fixes, so it is unclear what the true impact of these allegations are."
Somehow technology seems to evolve at a rapid pace, even when the standards bodies that help define it do not. Consider that most of today's websites are built on HTML4, a standard that was introduced in 1997. In the thirteen years since, the way we use the Web has changed dramatically, even if the underlying standard has not.
How was it that a loosely-coupled group of cyber-protestors could launch -- with varying degrees of success -- targeted distributed denial-of-service (DDoS) attacks against sites such as MasterCard, PayPal, PostFinance, and the website belonging to a Swedish prosecutor?
The WordPress development team has released version 3.0.2 of their popular open source blogging and publishing platform, a maintenance and security update for the 3.0.x branch of WordPress. According to the developers, the update addresses a security issue that could allow a malicious Author-level user to gain further access to a site.
In a previous tip, we looked at setting up an OpenVPN server. Now, I'll take you through the setup of a Linux OpenVPN client. The Linux client will be based on CentOS 5 using OpenVPN 2.0.9.
Protecting databases is hardly an easy task, but it is often the attacks that go after the simplest vulnerabilities that are most successful. Enterprises that stick to the basics will generate the most bang for their database security bucks.