Security

Want to support HowtoForge? Become a subscriber!
 

Virtual Users And Domains With Postfix, Courier, MySQL And SquirrelMail (Mandriva 2009.1 x86_64)

Virtual Users And Domains With Postfix, Courier, MySQL And SquirrelMail (Mandriva 2009.1 x86_64)

This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I'll also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses.

Virtual Users And Domains With Postfix, Courier, MySQL And SquirrelMail (CentOS 4.8 i386)

Virtual Users And Domains With Postfix, Courier, MySQL And SquirrelMail (CentOS 4.8 i386)

This document describes how to install a Postfix mail server that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I'll also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database used by Postfix.

How To Prevent Brute Force Attacks With Brutelock

How To Prevent Brute Force Attacks With Brutelock

Brutelock is an open source program that actively monitors various system logs and immediately blocks malicious IPs trying to attack your server. Brutelock not only protects against ssh attacks but also other common systems such as ftp, pop and imap.  It has an extendible rules format that allows you to monitor an unlimited number of other services by simply supplying the log file and a simple regex search pattern.

Installation & Configuration Of Intrusion Detection With Snort, ACIDBASE, MySQL, And Apache2 On Ubuntu 9.04 Using SPM

Installation & Configuration Of Intrusion Detection With Snort, ACIDBASE, MySQL, And Apache2 On Ubuntu 9.04 Using SPM

This tutorial describes how to install and configure Snort intrusion detection system (IDS), ACIDBASE (Basic Analysis and Security Engine), MySQL, and Apache2 on Ubuntu 9.04 using packages from Ubuntu’s Synaptic Package Manager. Snort will assist you in monitoring your network and alert you about possible threats. Snort will output its log files to a MySQL database which ACIDBASE will use to display in a graphical interface in web browser.

How To Install And Configure Advanced Policy Firewall (APF) On CentOS 5.3

How To Install And Configure Advanced Policy Firewall (APF) On CentOS 5.3

This tutorial explains how you can install and configure APF - an interface to IPTables which lets you easily configure a full featured firewall to secure servers and workstations connected to a network. This guide describes an example installation on a server with cPanel but it's only a matter of port numbers which must be open for everything to work. APF can be used on any system.

Firewall Access Policy Rulesets, Part 5

Firewall Access Policy Rulesets, Part 5

This article continues the series of articles on Firewall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article continues with examples of Access Policy rules and demonstrates how branching rules can be built.

Secure Your Wordpress Blog Administration With Two-Factor Authentication

Secure Your Wordpress Blog Administration With Two-Factor Authentication

Wordpress is a very popular blogging service. It was recently hit by a disturbing vulnerability that allowed attackers to reset the Administrator's password. While there is a patch for that vulnerability now, wouldn't it be best to not use static passwords? It is actually quite simple to add two-factor authentication to Wordpress.

Firewall Access Policy Rulesets, Part 4

Firewall Access Policy Rulesets, Part 4

This article continues the series of articles on Firewall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article continues with examples of Access Policy rules and demonstrates how IPv6 and mixed IPv4+IPv6 configurations can be built.

Firewall Access Policy Rulesets, Part 3

Firewall Access Policy Rulesets, Part 3

This article continues the series of articles on Firewall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article continues with examples of Access Policy rules and demonstrates generated configurations for iptables, PF and Cisco PIX.

Configuring fail2ban With SquirrelMail On Debian Lenny 5.0/ISPConfig 3

Configuring fail2ban With SquirrelMail On Debian Lenny 5.0/ISPConfig 3

In this article I will show how to prevent brute force attacks with Fail2ban against your SquirrelMail Web login using the Squirrel Logger plugin.

first page
previous page
...
20
...
next page
last page