Linux Tutorials on the topic “security”
-
How To Log Emails Sent With PHP's mail() Function To Detect Form Spam
Author: till • Tags: apache, php, security, debian, email • Comments: 56
How To Log Emails Sent With PHP's mail() Function To Detect Form Spam If you are running a webserver you might have faced the problem already: somewhere on your server is a vulnerable contact form or CMS system written in PHP that gets abused by spammers to send emails trough your server. If you have more than a few websites, it is a pain to detect which of the sites is vulnerable and sends the spam emails. This tutorial explains the installation of a small wrapper script which logs email messages sent trough the PHP mail() function.
-
How To Prevent Brute Force Attacks With Brutelock
Author: intuitivereason • Tags: security • Comments: 5How To Prevent Brute Force Attacks With Brutelock Brutelock is an open source program that actively monitors various system logs and immediately blocks malicious IPs trying to attack your server. Brutelock not only protects against ssh attacks but also other common systems such as ftp, pop and imap. It has an extendible rules format that allows you to monitor an unlimited number of other services by simply supplying the log file and a simple regex search pattern.
-
Installation & Configuration Of Intrusion Detection With Snort, ACIDBASE, MySQL, And Apache2 On Ubuntu 9.04 Using SPM
Author: redgreg68 • Tags: security, ubuntu • Comments: 10Installation & Configuration Of Intrusion Detection With Snort, ACIDBASE, MySQL, And Apache2 On Ubuntu 9.04 Using SPM This tutorial describes how to install and configure Snort intrusion detection system (IDS), ACIDBASE (Basic Analysis and Security Engine), MySQL, and Apache2 on Ubuntu 9.04 using packages from Ubuntu’s Synaptic Package Manager. Snort will assist you in monitoring your network and alert you about possible threats. Snort will output its log files to a MySQL database which ACIDBASE will use to display in a graphical interface in web browser.
-
-
How To Install And Configure Advanced Policy Firewall (APF) On CentOS 5.3
Author: Leszek • Tags: security, centos • Comments: 5
How To Install And Configure Advanced Policy Firewall (APF) On CentOS 5.3 This tutorial explains how you can install and configure APF - an interface to IPTables which lets you easily configure a full featured firewall to secure servers and workstations connected to a network. This guide describes an example installation on a server with cPanel but it's only a matter of port numbers which must be open for everything to work. APF can be used on any system.
-
Firewall Access Policy Rulesets, Part 5
Author: vkfwb • Tags: security • Comments: 1Firewall Access Policy Rulesets, Part 5 This article continues the series of articles on Firewall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article continues with examples of Access Policy rules and demonstrates how branching rules can be built.
-
Secure Your Wordpress Blog Administration With Two-Factor Authentication
Author: nowen • Tags: apache, linux, security • Comments: 3Secure Your Wordpress Blog Administration With Two-Factor Authentication Wordpress is a very popular blogging service. It was recently hit by a disturbing vulnerability that allowed attackers to reset the Administrator's password. While there is a patch for that vulnerability now, wouldn't it be best to not use static passwords? It is actually quite simple to add two-factor authentication to Wordpress.
-
Firewall Access Policy Rulesets, Part 4
Author: vkfwb • Tags: security • Comments: 0Firewall Access Policy Rulesets, Part 4 This article continues the series of articles on Firewall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article continues with examples of Access Policy rules and demonstrates how IPv6 and mixed IPv4+IPv6 configurations can be built.
-
Firewall Access Policy Rulesets, Part 3
Author: vkfwb • Tags: security • Comments: 0Firewall Access Policy Rulesets, Part 3 This article continues the series of articles on Firewall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article continues with examples of Access Policy rules and demonstrates generated configurations for iptables, PF and Cisco PIX.
-
Configuring fail2ban With SquirrelMail On Debian Lenny 5.0/ISPConfig 3
Author: CubAfull • Tags: email, linux, security • Comments: 3
Configuring fail2ban With SquirrelMail On Debian Lenny 5.0/ISPConfig 3 In this article I will show how to prevent brute force attacks with Fail2ban against your SquirrelMail Web login using the Squirrel Logger plugin.
-
Firewall Access Policy Rulesets, Part 2
Author: vkfwb • Tags: security • Comments: 0Firewall Access Policy Rulesets, Part 2 This article continues the series of articles on Firewall Builder, a graphical firewall configuration and management tool that supports many Open Source firewall platforms as well as Cisco IOS access lists and Cisco ASA (PIX). This article demonstrates several examples of Access Policy rules and generated configurations for iptables, PF and Cisco PIX.