Security

Want to support HowtoForge? Become a subscriber!
 

How To Log Emails Sent With PHP's mail() Function To Detect Form Spam

How To Log Emails Sent With PHP's mail() Function To Detect Form Spam

If you are running a webserver you might have faced the problem already: somewhere on your server is a vulnerable contact form or CMS system written in PHP that gets abused by spammers to send emails trough your server. If you have more than a few websites, it is a pain to detect which of the sites is vulnerable and sends the spam emails. This tutorial explains the installation of a small wrapper script which logs email messages sent trough the PHP mail() function.

Using DNS Name Object In Firewall Builder

Using DNS Name Object In Firewall Builder

This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can build firewall rules matching DNS A records.

Using Address Table Object In Firewall Builder

Using Address Table Object In Firewall Builder

This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can build firewall rules matching sets of ip addresses stored in external files.

Using Custom Service Object In Firewall Builder

Using Custom Service Object In Firewall Builder

This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with the Custom Service object in Firewall Builder.

How To Defend slowloris DDoS With mod_qos (Apache2 On Debian [Lenny])

How To Defend slowloris DDoS With mod_qos (Apache2 On Debian [Lenny])

mod_qos gives some fine-grained opportunities to scale the number of used connections and to defend an attack according to bandwidth limits. Unfortunately it is only available as source-package and there are many possible settings, wich might be hard to setup for this special case. So I provide the way that helped me.

Anonymous SSH Sessions With TOR

Anonymous SSH Sessions With TOR

OpenSSH is a great means to protect your connection from being sniffed by others. However, this isn't always enough. Simply proving that you connected to a server is enough to get incriminated. Unfortunately, SSH doesn't provide a native way to obfuscate to whom it connects. Instead, a proxy server can be set up. And this is where TOR comes to play. This howto covers installing TOR on a Debian based system and setting up SSH to use TOR.

Using ICMP And ICMP6 Service Objects In Firewall Builder

Using ICMP And ICMP6 Service Objects In Firewall Builder

This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with ICMP and ICMP6 service objects in Firewall Builder.

Using TCP And UDP Service Object In Firewall Builder

Using TCP And UDP Service Object In Firewall Builder

This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with TCP and UDP service objects in Firewall Builder.

Squid Proxy Server On Ubuntu 9.04 Server With DansGuardian, ClamAV, And WPAD (Proxy Auto-Detection) [Updated 07-08-09]

Squid Proxy Server On Ubuntu 9.04 Server With DansGuardian, ClamAV, And WPAD (Proxy Auto-Detection)

This tutorial will demonstrate how to set up a Squid Proxy server on Ubuntu 9.04 with DansGuardian (for content filtering) and ClamAV (for Virus scanning); in addition, we will set up Web Proxy AutoDetection (WPAD) through DHCP (in this case, either dhcp3 OR the Windows Server 2003 DHCP server) or DNS so that the only configuration necessary on the client side is to check "Auto-detect proxy settings for this network" in Firefox or Internet Explorer. At the end of the tutorial, users will have a fully functional and secure proxy for HTTP access. In addition, the final section will show users how to connect to this proxy server via SSH in order to have a protected browsing session while away from the home/office.

Using IP Service Object In Firewall Builder

Using IP Service Object In Firewall Builder

This article continues the series of articles on Fireall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates how you can work with IP Service object in Firewall Builder.

first page
previous page
...
20
...
next page
last page