Server Security - Page 37
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Peter Sergeant sent in a link on some Linux security basics. "If you count Trojan horses and rootkits, Linux (as a Unix derivative) crossed this line a long time ago. So it is high time that we designed and implemented some anti-virus schemes for Linux hosts. While there are hundreds of papers describing the process of securing or strengthening Linux (and, yes, this is another indication that Linux is popular), very few of them consider security from the perspective of an institution's anti-virus policy. The aim of this article is to shed some light on this subject.. . .
Super-secure additions to the Linux operating system are inching closer to the mainstream. Developers have turned Security-Enhanced Linux (SELinux), a prototype created in part by the National Security Agency, into a module that operates almost seamlessly on the Linux operating system.. . .
What you are about to read is a solution to spam that requires no reengineering of e-mail, the Web or any other systems. It could be set up to guarantee spam blocking using simple, existing technologies. I've dealt with corporate . . .
Like lots of network administrators, Gerald Posey would love to install commercial firewalls, IDSes and vulnerability assessment tools on his system. But he can't. His law enforcement agency in Louisiana lacks the money and manpower to guard an entire network, so instead he looks for less expensive options--free ones, actually. "We're looking for tools that are 'reasonably priced,'" jokes Posey, a data processing operations manager.. . .
Wouldn't it be great to have the ability to stop email-borne virus traffic, arguably the most ubiquitous kind, at the server level where you control the action? If this idea appeals to you, read on.. . .
Guardian Digital's Engarde Secure Linux Professional offers a lightweight, robust, and secure Linux Distribution for small and large networks. This distribution is really great for small to large business. Ease of administration and added security means less man hours. The . . .
Welcome to the home page of the Procmail Email Sanitizer. The Sanitizer is a tool for preventing attacks on your computer's security via email messages. It has proven to be very effective against the latest crop of Microsoft email worms that have gotten so much attention in the popular press.. . .
A flaw in BIND, a widely used software for locating Internet servers, could allow hackers to take companies' Web sites offline. Researchers have discovered a flaw in widely used software for locating Internet servers, which could allow the software to . . .
Security organizations have issued an alert about a BIND vulnerability which could see companies face denial-of-service attacks. The vulnerability is found in version 9 of the Internet Software Consortium's BIND (Berkeley Internet Name Domain) server. If it's exploited by an . . .
PAM stands for Pluggable Authentication Modules and is a system for providing application independence for authentication. A PAM-enabled application calls a stack of PAM modules to run authentication, open and close sessions, and check account validity.. . .
A recent report from the National Association for Security and Trust Evaluation warns of an increase in serious security breaches known as Denial of Responsibility (DoR) attacks. "Each attack is much more dangerous than traditional security flaws," says Warren N. Veighn of the Association, "because the extent of the vulnerabilities is so great, the time they affect deployed systems can stretch out to decades, and getting the source of the problem to react appropriately is by definition very difficult." . . .
Systrace enforces system call policies for applications. The policy can be generated interactively. Systrace can constrain the access that an application gets to the system. Operations not covered by the policy raise an alarm and allow an user to refine the currently configured policy.. . .
{Win32,Linux}/Simile.D is a very complex virus that uses entry-point obscuring, metamorphism, and polymorphic decryption. It is the first known polymorphic metamorphic virus to infect under both Windows and Linux. The virus contains no destructive payload, but infected files may display messages . . .
ActiveState has released a new enterprise version of PerlMx 2.0, our email security and filtering software for sendmail. PerlMx operates at the gateway and is over 98 percent effective in identifying spam. It now has virus, spam, and corporate communications compliance . . .
When a machine has only port 80 opened, your most trusted vulnerability scanner cannot return anything useful, and you know that the admin always patch his server, we have to turn to web hacking. SQL injection is one of type of . . .
This article discuss how sendmail currently handles file locking and how it will change in future versions. "Any application which uses either flock() or fcntl() style locking or other APIs that use one of these locking methods (such as open() with O_EXLOCK and O_SHLOCK) on files readable by other local untrusted users may be susceptible to local denial of service attacks.". . .
Most, if not all, of corporate web sites are fundamentally insecure. And this insecurity can allow attackers to access databases, delete or change information, and cause absolute chaos with very little effort or technical know how. . . .
Give an exploit to script kiddies, and they'll hit every vulnerable host in weeks. Build a worm with it, and it could take days. How long would a superworm take? Try 30 seconds. Brandon Wiley explains superworms and some possible self-defense . . .
If you just put your Apache web server online, and are thinking into making the first step in your system security, this brief article will help you do that. By having your own server, you must understand the responsibility behind it. . . .
During the Gulf War, computer hackers in Europe broke into a UNIX computer aboard a warship in the Persian Gulf. The hackers thought they were being tremendously clever -- and they were -- but they were also being watched. . . .