Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Introducing Remo - An Easy Way to Secure an Insecure Online Application with ModSecurity

Linux

Introducing Remo - An Easy Way to Secure an Insecure Online Application with ModSecurity

Post date: June 6, 2007, 23:06 Category: Security Views: 3203 Comments
Tutorial quote: Say you have a nasty application on your Apache webserver that has been installed by some people from the marketing department and you can neither remove nor patch it. Maybe it is a time problem, a lack of know-how, a lack of source-code, or possibly even political reasons. Consequently you need to protect it without touching it. There is ModSecurity, but they say this is only for experts. A straightforward alternative is Remo, a graphical rule editor for ModSecurity that comes with a whitelist approach. It has all you need to lock down the application.
OpenBSD

Creating secure wireless access points with OpenBSD and OpenVPN

Post date: December 13, 2005, 18:12 Category: Network Views: 7863 Comments
Tutorial quote: You know how insecure 802.11x wireless networks are. In this article we'll create an OpenBSD-based secure wireless access point that prevents unauthorized access and encrypts every packet using a VPN tunnel. OpenBSD is one of the most secure operating systems available, is easy to use, and includes almost everything you need for this project in the base installation.
Debian

Installing ModSecurity2 On Debian Etch

Post date: July 7, 2007, 00:07 Category: Installing Views: 3576 Comments
Tutorial quote: This article shows how to install and configure ModSecurity (version 2) for use with Apache2 on a Debian Etch system. ModSecurity is an Apache module that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc.
Unix+clones

Building a cheap secure wireless (WLAN) infrastructure with OpenVPN and Linux

Post date: January 2, 2007, 19:01 Category: Security Views: 4026 Comments
Tutorial quote: WEP is insecure and having different WPA authentications at different Access Points can be a pain. Why not centralize all your meeting rooms with OpenVPN to a central server? This tutorial gets you up to speed.
Unix+clones

Bypass any Firewall or Throttling ISP with SSH

Post date: October 22, 2007, 06:10 Category: Network Views: 4481 Comments
Tutorial quote: On some networks it’s impossible to use BitTorrent. For example, if you’re at work, school, or connected to Comcast or a public hotspot. But there’s an easy solution to overcome this problem. By using a secure connection (SSH), you can bypass almost every firewall or traffic shaping application.
Unix+clones

Optimizing C/C++ programs using the GProf profiler

Post date: May 24, 2005, 18:05 Category: Optimizing Views: 6545 Comments
Tutorial quote: One of the most important things to keep in mind while optimizing an application is: optimize where it counts. It is no use to spend hours optimizing a piece of code that usually runs for only 0.04 seconds anyway.

GProf provides a surprisingly easy way to profile your C/C++ application and spot the interesting pieces right away. A small case study shows how GProf was used to reduce the running time of a real-world application from over 3 minutes to under 5 seconds, by identifying 2 data structures as important and optimizing those.

Historically, the program goes back as far as 1982, when it was introduced on the the SIGPLAN Symposium on Compiler Construction. It is now a standard tool available on virtually all flavors of UNIX.
Fedora+Core

Enhancing Apache with mod_security

Post date: April 12, 2005, 18:04 Category: Security Views: 2743 Comments
Tutorial quote: Like probably quite a few of you, I run and admin some websites (some for fun, some for work), and as many of you surely do, some of these websites are mounted on a CMS. CMS are not the 8th wonder of the world, however some of them are pretty good, and they save you a lot of time by automating tons of tasks... however, as in every piece of code there exists, all of them are insecure and buggy (in fact, every piece of software is insecure and buggy to a degree)

So, searching for tools and ways to prevent people from breaking into my site without authorization, I began my search and found a great piece of software: mod_security for Apache.
Ubuntu

Setting Up ProFTPd + TLS On Ubuntu 8.10 (Intrepid Ibex)

Post date: November 18, 2008, 12:11 Category: Security Views: 3574 Comments
Tutorial quote: FTP is a very insecure protocol because all passwords and all data are transferred in clear text. By using TLS, the whole communication can be encrypted, thus making FTP much more secure. This article explains how to set up ProFTPd with TLS on an Ubuntu 8.10 server.
Ubuntu

Setting Up ProFTPd + TLS On Ubuntu 11.04 (Natty Narwhal)

Post date: September 27, 2011, 07:09 Category: Security Views: 3362 Comments
Tutorial quote: FTP is a very insecure protocol because all passwords and all data are transferred in clear text. By using TLS, the whole communication can be encrypted, thus making FTP much more secure. This article explains how to set up ProFTPd with TLS on an Ubuntu 11.04 server.
Debian

Setting Up ProFTPd + TLS On Debian Lenny

Post date: July 30, 2009, 15:07 Category: Security Views: 4296 Comments
Tutorial quote: FTP is a very insecure protocol because all passwords and all data are transferred in clear text. By using TLS, the whole communication can be encrypted, thus making FTP much more secure. This article explains how to set up ProFTPd with TLS on a Debian Lenny server.
Web-based applications and online marketing solutions - LumoLink