Server Security - Page 40
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
To defend themselves against a rising tide of electronic attacks, companies, agencies and other organizations should routinely try to crack their own secure systems, according to a report released today. To ensure cybersecurity, individual organizations should "conduct frequent, unannounced red-team penetration . . .
Although Microsoft has said that Windows XP is its most secure operating system that it has ever developed, security issues found within Windows 98, ME, and XP suggest that this statement doesn't hold much water. I wonder how issues such as these will affect adoption rates of .NET, where security is of the utmost importance.. . .
The vulnerability itself, CERT Advisory 2000-02, sometimes called cross-site scripting or malicious tagging, takes advantage of dynamically generated Web pages. Basically, a malicious script, which could be written in a number of different languages, can be inserted as input into dynamically . . .
Freeloading commercial emailers do more than fill your mailbox with unsolicited email. They also steal server time and network bandwidth, and have even crashed mailservers. And if your mail server can be used as a relay for spam, you may find your site "blackholed", cut off from sending email to many sites, in addition to getting thousands of angry email messages from the victims of the spam. . . .
The latest Microsoft bug is a doozy. Why do these things keep cropping up? The federal government and technology industry want you to believe the threats to our networks are external, not internal, where someone must be held accountable when things go wrong. Thus, we hear the rhetoric about cyberterrorists, hackers, and the so-called 'Digital Pearl Harbor' - things you can't easily point fingers at and hold someone accountable for when bad things happen.. . .
The problem: too much spam. Unsolicited advertising email continues to account for untold business losses each year. To give you an idea of the scope of the problem, in 1998 AOL reported that of the approximately 30 million email messages its . . .
Don't believe anyone who tells you he has the secret to enterprise security--the problem is far too big for any one service or product or practice to fix. But there are five definite steps you should take to establish a security baseline and set parameters for further and industry-specific security measures.. . .
A good case can also be made that Linux is inherently more stable and secure than Microsoft products, either because it's based on a better core of code or because it's open source, and many individuals have a stake in monitoring and making repairs.. . .
There are few things in life that annoy me as much as spam -- and I'm not talking about the canned meat by-product variety. Unsolicited ads are annoying in any form, but the nature of spam is parasitic as well: it steals time and bandwidth. So, for my money, anything that helps defeat spam is a Good Thing.. . .
A new vulnerability in OpenSSH can, under some circumstances, be exploited by a local attacker to execute arbitrary code with the permissions of the root user. Exploiting this vulnerability requires that the "UseLogin" option be enabled, which most systems do not configure in the default installation. The vulnerability affects OpenSSH versions earlier than 3.0.2.. . .
This article is the first one in a series about the main types of security holes in applications. We'll show the ways to avoid them by changing your development habits a little. This set of articles shows methods which can be . . .
In today's article, I'll build and configure procmail and get you started on a few basic recipes. In next week's article, I'll continue with some more complicated recipes and look at procmail's logging features.. . .
A commonly used technique among computer crackers, and experienced thieves as well, is to erase their fingerprints from the crime scene. This usually means erasing or modifying the logs stored on the computer that will expose them if carefully examined. Unprotected . . .
The vulnerability life cycle has three phases: the research/discovery phase -- in which both malicious and nonmalicious security researchers seek new holes in products; the disclosure phase -- in which the discoverer of the new vulnerability tells others about it; and . . .
At its simplest, a proxy server is a computer that accepts your requests for websites, makes the requests on your behalf (read: by proxy), and returns the results to you. With a proxy server, your Web browser never actually accesses any computers on the Internet. Web access is not all a proxy server can provide. Most proxy servers can proxy access to any Internet service. This means we can monitor FTP transfers and telnet sessions as well as Web browsing.. . .
The way to secure PHP scripts is through a carefully selected combination of configuration settings and safe programming practices. Based on the vulnerabilities that we have studied so far, we will now set forth to establish some rules that can help avoid dangerous situations. . . .
Security watchers are speculating that hackers familiar with the ways of the ninja may be attempting to construct a distributed denial of service (DDos) network on compromised Secure Shell Hosts (SSHs). Threads on security newsgroups have suggested that hackers may be . . .
Chris Evans, author of the "very secure" FTP daemon, has released version 1.0 of his software. The previous version included bandwidth control. Chris writes, "vsftpd is also extremely fast and scalable. vsftpd has achieved ~4000 concurrent users on a single machine, in a production environment.". . .
Joao Pedro reports that "It's possible to hijack an imp/horde session using a cross-site script attack, quite similar to the one explored by Marc Slemko in his "Microsoft Passport to Trouble" paper.". . .
A search for one kind of problem led analysts at the CERT Coordination Center to find another. In August, the security organization had begun to contact vendors to get lpd codes from the makers of various printers in an attempt to . . .