Server Security - Page 46
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
This Microsoft article does a good job of outlining a list of security issues that no patch can fix. Only dilligence in maintaining your systems can ensure you're systems are as secure as possible. "In other cases, the reported problems simply . . .
In the final entry of a three-part series of firewall product reviews, Pawel Leszek looks at dedicated appliance firewalls based on Linux. "Fire and forget" is the main idea behind hardware firewall appliances like WatchGuard's Firebox II, the Raptor Firewall from . . .
This document provides a step-by-step guide to building a more secure web server, as well as tips on network placement. "Web servers are the most exposed servers on the Internet. In order for clients/target groups to be able to access the . . .
An emerging technology promises to improve the security of the Internet's infrastructure by preventing hackers from hijacking Web traffic and redirecting it to bogus sites. The new security mechanism, dubbed DNSSEC, plugs a hole in the Internet's Domain Name System (DNS) . . .
While most Freenix admins are used to the normal concerns of Unix security, there is a higher world of security that has never been touched by Freenixes. The realm of trusted operating systems, long the province only of military and other ultra-secure environments, represents a security level beyond that of all but a few commercial operating systems. . . .
This paper presents the risks posed by an insecure DNS server and walks through compiling, installing, configuring and optionally, chroot'ing BIND 8. The test environment is Solaris 2.5, 2.6, 7 and 8. Many configuration and troubleshooting tips are provided, along with . . .
Requires free registration, but a good article nonetheless. "Can a firewall slow down HTTP proxies? If it is being used as a VPN (Virtual Private Network) endsite, and is performing encryption algorithms, the answer is "absolutely". Though proxy firewalls have come . . .
This paper examines internet security with respect to the WWW. A number of WWW security issues are presented in three areas: server, client and communication between server and client. Practical precautions and solutions are suggested regarding these issues. Guidelines for protecting host systems are discussed.. . .
What do you do when your site is attacked or your system fails? Backup, Avi Rubin argues, is the most reliable way to ensure that what you've lost can be recovered. Here he takes a look at protecting your backup and . . .
Squid is an excellent open source web caching proxy package, but it requires quite a lot of tuning to achieve the kind of performance seen in commercial proxies. This article presents several independently useful ideas for tuning a web caching system. . . .
This article is intended to bring you up to speed quickly on how to use postfix on your network as a secure means of receiving e-mail from and delivering it to Internet hosts. In particular we'll focus on deploying postfix on firewalls, in DMZs and in other settings in which it will be exposed to contact with untrusted systems.. . .
One vulnerability allows a malicious user to read passwords and discern network structure while the other allows a malicious user to create or browse file directories on a Web server. Both vulnerabilities provide a malicious user with access to sensitive data . . .
A computer-security company is warning network administrators to watch out for new rogue software capable of playing the role of foot soldier in denial-of-service attacks against Internet servers. X-Force, the research-and-development arm of Atlanta-based Internet Security Systems Inc., reported Tuesday that . . .
If it's speed and security you're looking for, Postfix is a very nominal choice for a MTA. The MTA uses multiple layers of defense to protect the local system against intruders, as well as having the ability to run in a chroot jail. . . .
What do you do when your site is attacked or your system fails? Backup, Avi Rubin argues, is the most reliable way to ensure that what you've lost can be recovered. Here he takes a look at protecting your backup and recommends some products that can help. . . .
More workers feel stressed out by computers than those driven to distraction by traffic jams, queuing, and the in-laws -- and some find them even more stress-inducing than the end of a relationship, according to a survey. . . .
As Linux Mandrake works it's way away from it's Red Hat roots, they've added a number of features "out of the box" that make it easier to use as a server. However, there are still a number of things that I . . .
The CERT/CC has begun receiving reports of an input validation vulnerability in the rpc.statd program being exploited. This program is included, and often installed by default, in several popular Linux distributions. Please see Appendix A of this document for specific information . . .
The Internet may feel like a place where you roam anonymously and privately, but with every foray onto the Internet, your PC actively exchanges information with other computers. So just how private and secure are these communications?
There are basically three reasons to use a database, rather than a text file, to store data. The first reason is speed. Accessing data stored in a database is much faster than accessing data stored in a text file. A database is designed for rapid location of information. A text file, you have to read through each record until you find what you are looking for.. . .