Server Security - Page 31

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Server Security News

Security considerations when migrating from Unix to Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Linux server market is expected to grow by 35% from last year, according to research firm IDC. Many of these Linux systems are replacing Unix in corporations looking to reduce IT costs. However, at the same time, there are more attacks on Linux than ever before. So, if you're considering a migration from your Unix systems to Linux, it's important to keep security in mind.. . .

The top 10 internet security scr*w ups!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With over 10 years experience of defending against Internet Security threats, Tom Salkield, Managing Director of NetConnect, has seen it all. NetConnect, part of Netstore plc, is one of founders of the UK Internet Security industry, and Tom has dealt with . . .

Nessus Scanning on Windows Domain

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This paper is about using Nessus to scan Windows networks and various scenarios one might encounter. It does not talk about running Nessus from a Windows machine but on a Windows machine or network. In other words, Windows computers are targets. . .

Ignore standards for web services security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Companies should take the proprietary route to provide security for web services-based transactions over the next three years, according to analysts. In a research paper, Security Pattern Standards Face a Long Road to Maturity, analyst Gartner advises firms to rely on vendor-provided technology to provide security for web services-based transactions until 2006. . .

Study: Paucity of patches on OpenSSL

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Only 3 percent of Web servers running the open-source version of a secure communications component, OpenSSL, may be using the latest, bug-free software, according to a recent survey by Internet watcher NetCraft. The OpenSSL secure sockets layer software allows servers to . . .

Linux finds more homes among enterprises

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux cannot hold a candle to Microsoft in the fight for OS space yet, but it is gaining popularity among enterprises because of its low cost and support from governments. According to IDC, paid shipments of Linux server operating environments captured . . .

Web Intrusion Detection And Prevention

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ModSecurity is an open source intrusion detection and prevention engine for web applications. It operates embedded into the web server, acting as a powerful umbrella - shielding applications from attacks. ModSecurity supports Apache (both branches) today, with support for Java-based servers coming soon.. . .

Developers Believe in Linux Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The survey, conducted by Evans Data Corp., Santa Cruz, Calif., showed that developers view Linux as "the most innately secure operating system. In fact, the percentage of developers who said so increased to 23 percent, up from 19 percent six months . . .

Blind SQL Injection: Are Your Vulnerable

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SQL Injection can deliver total control of your server to an attacker giving them the ability to read, write and manipulate all data stored in your backend systems. Despite being remarkably simple to protect against, there are an astonishing number of . . .

Simplifying Data Protection Decisions

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

No one doubts that computers have made businesses more fast-paced, efficient and flexible. The clerks of Dickens' day, laboriously entering facts and figures into ledgers, are long gone. The 20th century's legions of secretaries armed with typewriters, carbon paper and filing . . .

Linux fights off worms

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The forthcoming Red Hat Enterprise Linux (RHEL) 3 suite will include a new feature to thwart worms and hackers. The news arrives as the security of open-source systems comes under increased scrutiny.. . .