Security

Want to support HowtoForge? Become a subscriber!
 

Preventing Brute Force Attacks With BlockHosts On Debian Lenny

Preventing Brute Force Attacks With BlockHosts On Debian Lenny

In this article I will show how to install and configure BlockHosts on a Debian Lenny system. BlockHosts is a Python tool that observes login attempts to various services, e.g. SSH, FTP, etc., and if it finds failed login attempts again and again from the same IP address or host, it stops further login attempts from that IP address/host. By default, BlockHosts supports services that use TCP_WRAPPERS, such as SSH, i.e. services, that use /etc/hosts.allow or /etc/hosts.deny, but it can also block other services using iproute or iptables.

Setting Up ProFTPd + TLS On Ubuntu 10.04 (Lucid Lynx)

Setting Up ProFTPd + TLS On Ubuntu 10.04 (Lucid Lynx)

FTP is a very insecure protocol because all passwords and all data are transferred in clear text. By using TLS, the whole communication can be encrypted, thus making FTP much more secure. This article explains how to set up ProFTPd with TLS on an Ubuntu 10.04 server.

How To Integrate ClamAV (Through mod_clamav) Into ProFTPd For Virus Scanning On Ubuntu 10.04

How To Integrate ClamAV (Through mod_clamav) Into ProFTPd For Virus Scanning On Ubuntu 10.04

This tutorial explains how you can integrate ClamAV into ProFTPd for virus scanning on an Ubuntu 10.04 system. This is achieved through mod_clamav. In the end, whenever a file gets uploaded through ProFTPd, ClamAV will check the file and delete it if it is malware.

How To Configure PureFTPd To Accept TLS Sessions On Debian Lenny

How To Configure PureFTPd To Accept TLS Sessions On Debian Lenny

FTP is a very insecure protocol because all passwords and all data are transferred in clear text. By using TLS, the whole communication can be encrypted, thus making FTP much more secure. This article explains how to configure PureFTPd to accept TLS sessions on a Debian Lenny server.

How To Integrate ClamAV (Through mod_clamav) Into ProFTPd For Virus Scanning On Debian Lenny

How To Integrate ClamAV (Through mod_clamav) Into ProFTPd For Virus Scanning On Debian Lenny

This tutorial explains how you can integrate ClamAV into ProFTPd for virus scanning on a Debian Lenny system. This is achieved through mod_clamav. In the end, whenever a file gets uploaded through ProFTPd, ClamAV will check the file and delete it if it is malware.

How To Set Up Kojoney SSH Honeypot On CentOS 5.5

How To Set Up Kojoney SSH Honeypot On CentOS 5.5

Kojoney is a low level interaction honeypot that emulates an SSH server. The daemon is written in Python using the Twisted Conch libraries. In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated, (un)protected, and monitored, and which seems to contain information or a resource of value to attackers. This tutorial shows how you can compile and install updated version of Kojoney on CentOS 5.5 server.

How To Integrate ClamAV Into PureFTPd For Virus Scanning On Fedora 13

How To Integrate ClamAV Into PureFTPd For Virus Scanning On Fedora 13

This tutorial explains how you can integrate ClamAV into PureFTPd for virus scanning on a Fedora 13 system. In the end, whenever a file gets uploaded through PureFTPd, ClamAV will check the file and delete it if it is malware.

How To Configure The AIDE (Advanced Intrusion Detection Environment) File Integrity Scanner For Your Website

How To Configure The AIDE (Advanced Intrusion Detection Environment) File Integrity Scanner For Your Website

A file integrity scanner is something you need to have.  Imagine a hacker placing a backdoor on your web site, or changing your order form to email him a copy of everyone's credit card while leaving it appear to be functionally normally. By setting up daily reporting, this notifies you within, at most, 24 hours of when any file was changed, added, or removed.  It also helps establish an audit trail in the event your site is compromised. These instructions are designed for an end user, where you don't need to have root access, to implement and assumes your server has the aide binary installed.  Most hosts will have this installed already, or will install it for you upon request.

Chrooting Apache2 With mod_chroot On Ubuntu 10.04

Chrooting Apache2 With mod_chroot On Ubuntu 10.04

This guide explains how to set up mod_chroot with Apache2 on an Ubuntu 10.04 system. With mod_chroot, you can run Apache2 in a secure chroot environment and make your server less vulnerable to break-in attempts that try to exploit vulnerabilities in Apache2 or your installed web applications.

Chrooting Apache2 With mod_chroot On CentOS 5.4

Chrooting Apache2 With mod_chroot On CentOS 5.4

This guide explains how to set up mod_chroot with Apache2 on a CentOS 5.4 system. With mod_chroot, you can run Apache2 in a secure chroot environment and make your server less vulnerable to break-in attempts that try to exploit vulnerabilities in Apache2 or your installed web applications.

first page
previous page
...
11
...
next page
last page
XML feed
"Facebook" is a registered trademark of Facebook, Inc. All rights reserved.