Server Security - Page 30
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Perhaps one of the most challenging situations in an IT organisation is to let a systems administrator go. This individual has the proverbial keys to the kingdom as a trusted member of your corporate team. If the time comes to part . . .
The worldwide market for security server appliances grew by 22 percent in the third quarter, and is expected to continue increasing next year, a market research firm said Thursday.. . .
With network device vulnerabilities being discovered all the time, should you be monitoring patch management yourself, or is outsourcing the best option? If the IT industry was subject to the same restrictions as the car industry, the number of equipment recalls . . .
Are data-privacy regulations and dreams about stolen employee data keeping you up at night? It may be time to protect your data where it lives--in your database.. . .
Don't even get me started on security vendors peddling "Intrusion Prevention Systems" (IPS) like they're some kind of silver bullet cure for all security ills. I'd like to see some of those vendors taken to court on a Trade Practices Act . . .
"We see people looking for a tool that will solve all their problems, but what you need is a process; it's not just about the tool," says Felicia Nicastro, senior network systems consultant for International Network Services, a consulting firm that . . .
Nobody knows when the first patch was issued, but it was almost certainly shortly after the first release of the first software package. No matter how much testing is done in-house, the real world and real users always exercise applications in . . .
The rsync team has received evidence that a vulnerability in rsync was recently used in combination with a Linux kernel vulnerability to compromise the security of a public rsync server. While the forensic evidence we have is incomplete, we have pieced together the most likely way that this attack was conducted and we are releasing this advisory as a result of our investigations to date.. . .
Michael S. Mimoso submitted, "A dangerous vulnerability in the Linux kernel is at the heart of a recent attack on the Debian Project's development servers. The flaw, an integer overflow in the brk system call, enabled an attacker to compromise . . .
For those of you who don't know the acronym, XSS stands for Cross-Site Scripting. It is the term that has been given to web pages that can be tricked into displaying web surfer supplied data capable of altering the page for . . .
Critical security bug has been discovered in the Linux kernel within do_brk() function that may lead to full compromise of vulnerable system. Successful exploitation of do_brk() leads to full compromise of vulnerable system, including gaining full uid 0 privileges... EnGarde Secure Linux is not vulnerable to this exploit and no update is necessary. Other vendors are expected to publish updates shortly.. . .
A UK based security firm claimed today that digital attacks on Web sites using the Linux operating system have reached an all-time high over the last three months. British firm mi2g claimed that Windows based servers were more resilient from March . . .
If you are hosting your Web site on your own server, you need to pay particular attention to security. You should probably install intrusion detection software such as Tripwire. If you're running a Web server you need to be aware . . .
Bayesian filtering works very well, measured at greater than 99.9 percent accuracy at detecting spam and other unwanted e-mails. In his paper, "A Plan For Spam", Paul Graham popularized Bayesian filtering on word groupings to prevent spammers from getting their messages . . .
BIND 8.4.3 is a maintenance release of BIND 8.4. It includes the BIND 8.4.2 release which includes a security fix (also released as BIND 8.3.7). EnGarde has updates available; other vendors expected to follow shortly. It is not yet known if this impacts BIND-9; updates to follow.. . .
Nearly half of the nation's fastest-growing companies suffered a recent breach in information security, according to a survey released Monday by consulting giant PricewaterhouseCoopers.. . .
It is amazing how much easier it is to get through an inbox uncluttered by unwanted messages. After a week of email nearly free of spam and viruses, the time and effort it took to configure a Linux mail server with . . .
As web services become more complex and involve interaction between multiple parties, users will require more versatile security. Simple, point-to-point web services can be secured in much the same way as interactive web sessions are secured today, by using Secure Sockets . . .
In part one of this short article series we looked at some of the advantages of Oracle's row level security, what it can be used for, and looked at a simple example of how it works. We'll conclude this series by . . .
Do you want to be aggressive, very aggressive in stopping spam? Then what you might want to do is to set up a fake open proxy or e-mail relay as a honeypot.. . .