linux poison RSS
linux poison Email
1

Free Guide - Web Application Security; How to Minimize Prevalent Risk of Attacks

"Web Application Security; How to Minimize Prevalent Risk of Attacks"

Vulnerabilities in web applications are now the largest vector of enterprise security attacks.

Stories about exploits that compromise sensitive data frequently mention culprits such as "cross-site scripting," "SQL injection," and "buffer overflow." Vulnerabilities like these fall often outside the traditional expertise of network security managers.

To help you understand how to minimize these risks, Qualys provides this guide as a primer to web application security.

The guide covers:
 * Typical web application vulnerabilities
 * Comparison of options for web application vulnerability detection
 * QualysGuard Web Application Scanning solution

Download your free copy of "Web Application Security; How to Minimize Prevalent Risk of Attacks" - here


Read more
0

Manage your Flickr Photo from Ubuntu Desktop - Frogr

Frogr is a small application for the GNOME desktop that allows users to manage their accounts in the Flickr image hosting website. It supports all the basic Flickr features, including uploading pictures, adding descriptions, setting tags and managing sets and groups pools.

Frogr Features:
 * Allow to upload pictures to flickr, specifying details such as title, description, tags, visibility, content type, safety level and whether the to "show up on global search results", both individually or to several pictures at once.
 * Allow uploading pictures located in remote machines, through typically supported protocols (SAMBA, SSH, FTP...).
 * Allow sorting pictures by title and date taken, besides the default order ("as loaded").
 * Allow adding tags to pictures, opposite to just set them through the 'details' dialog.
 * Allow setting specific licenses and geolocation information for pictures right from the desktop.
 * Allow specifying sets and group pools for the pictures to be added to after the upload process.
 * Allow to create sets right from frogr, opposite to just adding pictures to already existing ones.
 * Allow specifying a list of pictures to be loaded from command line.
 * Import tags from picture's metainformation if present when loading.

Read more
0

Install Tor Browser Bundle under Ubuntu Linux

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.

Read more
0

Free eBook - Linux Email -- Free Sample Chapter

"Linux Email -- Free Sample Chapter"

Set up, maintain, and secure a small office email server.
Many businesses want to run their email servers on Linux for greater control and flexibility of corporate communications, but getting started can be complicated. The attractiveness of a free-to-use and robust email service running on Linux can be undermined by the apparent technical challenges involved. Some of the complexity arises from the fact that an email server consists of several components that must be installed and configured separately, then integrated together. This book gives you just what you need to know to set up and maintain an email server. Unlike other approaches that deal with one component at a time, this book delivers a step-by-step approach across all the server components, leaving you with a complete working email server for your small business network.

This free sample chapter, Chapter 4: Providing Webmail Access, shows how to set up webmail access using SquirrelMail. This will give users an easy, out-of-office access to their email. Be introduced to the SquirrelMail software package and examine the pros and cons of this and other webmail access solutions. After that, it will follow the installation and configuration of SquirrelMail step by step. Next, it will examine the installation of plugins and include a reference of useful plugins. Finally, it will include some tips on how to secure SquirrelMail.

Download your free sample chapter - here



Read more
1

Bash Script - Protect your server from DDos (Distributed Denial of Service) Attack

What is DDos attack:
On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.

DDoS-Deflate is a very simple but effective bash script which monitors the numbers of connection made by a particular ip address using 'netstat' command and if the number of connection from a single ip address reaches a particular limit (150 default) it will block that ip address using simple iptables rules for defined time period.

DDoS-Deflate Installation:
Open the terminal and type following command:
wget http://www.inetbase.com/scripts/ddos/install.sh
chmod 0700 install.sh
./install.sh
After successful installation, you can find the DDoS-Deflate configuration file at: /usr/local/ddos/ddos.config
Read more
0

White Paper - Enforcing Enterprise-out Security for Cloud Servers

"Enforcing Enterprise-out Security for Cloud Servers"

Learn how to maintain a secure environment in the cloud.

Cloud-based computing models offer the promise of a highly scalable compute infrastructure without having to acquire, install and maintain any additional hardware. However, implementing this new compute model using even the most trusted service providers requires a security solution that empowers IT to maintain control over user and network access to those hosted virtual machines.

Security becomes even more important given the regulatory climate and audit pressures surrounding PCI, SOX, BASEL II and HIPAA. Centrify solves these difficult problems by providing an enterprise-out security enforcement approach that leverages existing Active Directory-based security policy enforcement and IPsec-based server and domain isolation. Together, these technologies enable rapid expansion of cloud compute capacity while still maintaining a secure environment.

Download your free white paper on "Enforcing Enterprise-out Security for Cloud Servers" - here



Read more
Related Posts with Thumbnails