Providing a high degree of security by types of Encryption

Filetopia uses many encryption components which provide a high degree of security. For the “Public Key” (PK) functionality, it uses an asymmetric cipher based on “Elliptic Curves” and for symmetric encryption it can use several…

Site Security in HTML Creating Commercial Websites

Site Security in Creating Commercial Websites, Here’s a good way to look at total site security: It’s a myth. We always arrange our clients’ sites with this point in mind: Anything you put on the…

Server Security Issues

writing this section scares the britches off us, so we want to start with a warning: There are many security measures you can (and should) take when setting up your own server. However, the only…

Ubuntu Linux: Turn On Exec-Shield Buffer Overflow Protection

I am trying to set exec-shield protection on Linux as described here but getting the following error on Ubuntu Linux server version 12.04 LTS: sysctl -w kernel.exec-shield=1 error: “kernel.exec-shield” is an unknown key How do…

Nginx: Allow All But Block Certain POST Request URLS For Selected Spammer IP Address/CIDR

I am a small business and ecom site owner. I also run a WordPress based blog to connect with my customers. However, I get too much spam from certain IPs and net-blocks. How do I…

Increase NFS Client Mount Point Security For a Web-Server noexec, nosuid, nodev Options

I am using NFS server version 4.x on a CentOS/RHEL based system. I’m mounting my shared /var/www/ directory on five Apache based nodes using the following syntax: mount -t nfs4 -o rw,intr,hard,proto=tcp rocknas02:/httproot/www /var/www/ I…

Linux: Log Suspicious Martian Packets / Un-routable Source Addresses

I run a web-server and I would like to log packets with un-routable source addresses on Linux operating system. How can I log spoofed packets on Debian / Ubuntu / CentOS / RHEL / Linux…

Linux: Hide Processes From Other Users

I run a multi-user system. Most users access resources using ssh client. How can I stop leaking process information to all users on Linux operating systems? How do I prevent users from seeing processes that…

How To PFSense Configure Network Interface As A Bridge / Network Switch

I have Soekris single board communication embedded computers which is optimized for low power and network usage. The server has four Ethernet ports. I’ve installed PFSense firewall on it and configure WAN + LAN ports.…

How To Patch and Protect Linux Server Against the Glibc GHOST Vulnerability # CVE-2015-0235

A very serious security problem has been found in the GNU C Library (Glibc) called GHOST. How can I fix GHOST vulnerability and protect my Linux server against the attack? How do I verify that…