Security

free howtos tutorials on security, installation, configuration, support, technical quries, tips

Easy way to Chroot the Apache server

The first step of securing the server is to prepare a chrooted environment for the Apache server with PHP module. At this point, we should perform all the steps described in the “Chrooting the server” section of the previous article. In addition, before running Apache in chrooted environment for first time, we must also copy(…)

How to Defend against CSS and SQL Injection attacks

The last step of securing the server is implementing the logging of the GET and POST payloads, and implementing protection against Cross-Site-Scripting and SQL Injection attacks. In order to perform that, we will use the mod_security module, which we enable by adding the following line into httpd.conf: AddModule mod_security.c To enable logging of the GET(…)

How to Disable mod_security in .htaccess file

1. If you do not have one yet, an .htaccess file in the folder of your web application 2. To disable mod_security COMPLETELY, add the following line to the .htaccess file: SecFilterEngine Off OR, to disable HTTP POST scanning only, use the following instead: SecFilterScanPOST Off 3. Save the file and test your web application(…)

Secure your Apache2 with mod-security

Installation: In order to install mod-security with apache2, you need libapache2-mod-security: $sudo apt-get install libapache2-mod-security and then enable mod-security and reload apache2 $sudo a2enmod mod-security $sudo /etc/init.d/apache2 force-reload Once this is done, you will be able to filter GET, POST urls …. and apply different rules depending on what the page/variables/url contain Configuration: Apache running(…)

20 ways to Secure your Apache Configuration

First, make sure you’ve installed latest security patches There is no sense in putting locks on the windows, if your door is wide open. As such, if you’re not patched up there isn’t really much point in continuing any longer on this list. Go ahead and bookmark this page so you can come back later,(…)

A Guide to Internet Security Terms

Every Internet user should at least have a basic understanding of the terms used in regard to online security and so I have collected a few of the popular ones and put them in this article with a brief explanation of each. Adware means “Advertising Supported Software”. It refers to placing adverts in software or(…)

How to Configure PIX Firewall.

Please find below a step by step process to configure the PIX Firewall from scratch. A simple scenario is given here where you have a corporate network with a PIX Firewall connected to the Internet through the Outside Interface, Internal Network through the Inside interface and DMZ through the DMZ Network. This paper would assist(…)

Basic PIX Troubleshooting

The “show interfaces” Command The show interfaces command will show you the basic status of the PIX’s interfaces. I’ve included some sample output below: pixfw# show interface interface ethernet0 “outside” is up, line protocol is up Hardware is i82559 ethernet, address is 0009.e89c.fdaa IP address 97.158.253.25, subnet mask 255.255.255.248 MTU 1500 bytes, BW 10000 Kbit(…)

How To Make Your PIX A DHCP Server

Enabling your PIX to be a DHCP server for your home network requires very few statements. First you have to enable the feature on the desired interface, which is usually the “inside” interface. The next step is to set the range of IP addresses the PIX’s “inside” interface will manage, and finally, you need to(…)

How To Configure Your PIX To Accept Telnet

The telnet command can be used to configure your PIX to accept telnet sessions. By default, it allows connections on the inside interface from the 192.168.1.0 network, as seen below: telnet 192.168.2.0 255.255.255.0 inside Of course, if you change the IP address of the inside interface, you may have to change the statement above. You(…)