Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Security Testing your Apache Configuration with Nikto

Unix+clones

Security Testing your Apache Configuration with Nikto

Post date: August 29, 2006, 16:08 Category: Security Views: 3530 Comments
Tutorial quote: By now you've got the perfect setup for your new Ubuntu 6.0.6 (Dapper Drake) box. You may have even followed the excellent Intrusion Detection and Prevention with BASE and Snort tutorial. And as an added precaution you installed DenyHosts to prevent hack attempts via ssh. But now that you've got your new LAMP server on the internet, how can you tell that your new web server is secure? You test it, of course!
Unix+clones

Apache Maintenance Basics

Post date: April 13, 2005, 01:04 Category: Software Views: 2798 Comments
Tutorial quote: You've downloaded and configured your Apache server and are ready to move on to the next project. Can it really be left to fend for itself in a darkened room?

Yes. To some degree, anyway. With the exception of configuration testing, once Apache is up, you likely need never think about how the Web server is running.

On the other hand, completely ignoring your Apache installation would be foolhardy. Doing some regular checks and maintenance on your Apache installation helps identify any issues — usually before they even become issues — and helps you stay up date with the latest security and performance patches. This article covers some of the major steps and maintenance tasks that should be regularly undertaken while the Apache system is running.
Unix+clones

Automated FTP Bandwidth Testing

Post date: June 9, 2008, 15:06 Category: Network Views: 4464 Comments
Tutorial quote: Ever have bandwidth issues and wish you could automated the testing process instead of manually testing every other hour of the day? I have.

By using this bash script we are able to automate an upload and download of a file and email the speed results.
Linux

Linux Security HOWTO

Post date: April 12, 2005, 17:04 Category: Security Views: 2816 Comments
Tutorial quote: This document is a general overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders. Also included are pointers to security-related material and programs.
Solaris

NSA Publically-Released Solaris 8 Security Guide

Post date: October 21, 2006, 04:10 Category: Security Views: 5886 Comments
Tutorial quote: Sun Solaris 8 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 8 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.

Solaris

NSA Publically-Released Solaris 9 Security Guide

Post date: October 21, 2006, 04:10 Category: Security Views: 6407 Comments
Tutorial quote: Sun Solaris 9 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 9 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.

Solaris

NIST Publically-Released Fedora/Red Hat Core Security Guide

Post date: October 21, 2006, 04:10 Category: Security Views: 6005 Comments
Tutorial quote: The Benchmark is a compilation of security configuration actions and settings that "harden" Red Hat Linux operating systems. It is a CIS Level-I benchmark: the prudent level of minimum due care for operating system security. This benchmark was developed and tested on Red Hat Enterprise Linux (RHEL) including RHEL 2.1, RHEL 3.0, and Fedora Core 1, 2, & 3. It is likely to work for other Linux distributions - especially Red Hat and Fedora derivatives - as well.
OSX

NSA Publically-Released OS X Secuirty Configuration (reload) Guide

Post date: October 21, 2006, 04:10 Category: Security Views: 5520 Comments
Tutorial quote: Apple Mac OS X
NSA has developed and distributed configuration guidance for Apple Operating Systems. This guidance can be used by US government and other entities as a security baseline.

Debian

Securing Debian Manual

Post date: January 1, 2008, 13:01 Category: Security Views: 3639 Comments
Tutorial quote: This document describes security in the Debian project and in the Debian operating system. Starting with the process of securing and hardening the default Debian GNU/Linux distribution installation, it also covers some of the common tasks to set up a secure network environment using Debian GNU/Linux, gives additional information on the security tools available and talks about how security is enforced in Debian by the security and audit team.
Linux

Hardening Linux: a 10 step approach to a secure server

Post date: June 22, 2005, 10:06 Category: Security Views: 3484 Comments
Tutorial quote: The Internet has become a far more dangerous place than it was 20 years ago. Nowadays, Operating System and application security is an integral part of a server configuration and, while firewalls are very important, they are not the panacea.

This list of steps is intended as a guideline with a practical approach. We’ll try to provide a complete picture without getting into unnecesary details. This list won’t replace a good book on secure systems administration, but it will be useful as a quick guide.

Before we get started it’s worth to mention that security is not a status: it’s just a process. The correct initial setup of the server only provides a good start and helps you get half the way through. But you actually need to walk the other half of the road, by providing proper security vigilance, monitoring and updating.
Web-based applications and online marketing solutions - LumoLink