Security

Want to support HowtoForge? Become a subscriber!
 

Installing ISP-fw (Firewall) On Linux

Installing ISP-fw (Firewall) On Linux

ISP-fW is a firewall script that provides port forwarding, packet filtering, stateful packet inspection, port redirection, masquerading, SNAT/ DNAT, TOS, and never the last it generates htb rules for bandwidth management. With ISP-fw, you can turn a PC into a gateway with shaping capabilities.

Preventing MySQL Injection Attacks With GreenSQL On Debian Etch

Preventing MySQL Injection Attacks With GreenSQL On Debian Etch

GreenSQL (or greensql-fw) is a firewall for MySQL databases that filters SQL injection attacks. It works as a reverse proxy, i.e., it takes the SQL queries, checks them, passes them on to the MySQL database and delivers back the result from the MySQL database. It comes with a web interface (called greensql-console) so that you can manage GreenSQL through a web browser. This guide shows how you can install GreenSQL and its web interface on a Debian Etch server.

Ultimate Security Proxy With Tor

Ultimate Security Proxy With Tor

Nowadays, within the growing web 2.0 environment you may want to have some anonymity, and use other IP addresses than your own IP. Or, for some special purposes - a few IPs or more, frequently changed. So no one will be able to track you. A solution exists, and it is called Tor Project, or simply tor. There are a lot of articles and howtos giving you the idea of how it works, I'm not going to describe here onion routing and its principles, I'll rather tell you how practically pull out the maximum out of it.

Firewall Management With Gufw On Ubuntu 8.04

Firewall Management With Gufw On Ubuntu 8.04

Gufw is a graphical frontend for managing an iptables firewall on an Ubuntu 8.04 desktop. It is based on ufw and enables you to allow or block pre-configured, common p2p, or individual ports. This guide shows how you can install and use Gufw on Ubuntu 8.04.

Secure SSH Using WiKID Two-Factor Authentication And TACACS+

Secure SSH Using WiKID Two-Factor Authentication And TACACS+

These instructions are designed to help you configure and test using the WiKID TACACS+ protocol module via Linux PAM on Red Hat. This document has been updated to cover pam .99 and higher. We assume that you have already installed the open-source WiKID Strong Authentication Server Community Edition.

Spam Blocking And Web Filtering With The Untangle 5.3 Network Gateway

Spam Blocking And Web Filtering With The Untangle 5.3 Network Gateway

Untangle bundles common open-source applications for blocking spam, spyware, viruses, adware and unwanted content on the network in one single Linux distribution. It can be integrated into existing networks either as a router or as a transparent bridge (directly behind the router, but before the switch that connects the client PCs with the router). The best thing about Untangle is that you don't have to reconfigure the client PCs - Untangle works out of the box.

Preventing Brute Force Attacks With Fail2ban On Mandriva 2008.1

Preventing Brute Force Attacks With Fail2ban On Mandriva 2008.1

In this article I will show how to install and configure fail2ban on a Mandriva 2008.1 system. Fail2ban is a tool that observes login attempts to various services, e.g. SSH, FTP, SMTP, Apache, etc., and if it finds failed login attempts again and again from the same IP address or host, fail2ban stops further login attempts from that IP address/host by blocking it with an iptables firewall rule.

Preventing Brute Force Attacks With Fail2ban On Fedora 9

Preventing Brute Force Attacks With Fail2ban On Fedora 9

In this article I will show how to install and configure fail2ban on a Fedora 9 system. Fail2ban is a tool that observes login attempts to various services, e.g. SSH, FTP, SMTP, Apache, etc., and if it finds failed login attempts again and again from the same IP address or host, fail2ban stops further login attempts from that IP address/host by blocking it with an iptables firewall rule.

Running Vhosts Under Separate UIDs/GIDs With Apache2 mpm-peruser On Debian Etch

Running Vhosts Under Separate UIDs/GIDs With Apache2 mpm-peruser On Debian Etch

This article explains how you can install and configure apache2-mpm-peruser on a Debian Etch server. apache2-mpm-peruser is an MPM (Multi-Processing Module) for the Apache 2 web server, very similar to apache2-mpm-itk, but faster (almost as fast as apache2-mpm-prefork). mpm-peruser allows you to run each of your vhosts under a separate UID and GID - in short, the scripts and configuration files for one vhost no longer have to be readable for all the other vhosts. It is based on metuxmpm, a working implementation of the perchild MPM. The result is a sane and secure web server environment for your users, without kludges like PHP's safe_mode.

first page
previous page
...
20
...
next page
last page
XML feed
"Facebook" is a registered trademark of Facebook, Inc. All rights reserved.