Skip to main content

Posts

Showing posts from June 13, 2010

Employee monitoring: When IT is asked to spy

By Tam Harbert Computerworld - It's 9:00 in the morning, or 3:00 in the afternoon, or even 10:00 at night. Do you know what your users are up to? More than ever, IT managers can answer "Oh, yes" to that query. As corporate functions, including voice and video, converge onto IP-based networks, more corporate infractions are happening online. Employees leak intellectual property or trade secrets, either on purpose or inadvertently; violate laws against sexual harassment or child pornography; and waste time while looking like they are hard at work. In response -- spurred in part by stricter regulatory, legal and compliance requirements -- organizations are not only filtering and blocking Web sites and scanning e-mail. Many are also watching what employees post on social networks and blogs, even if it's done from home using noncompany equipment. Read More ...

Apache Setup (Part 2)

In the previous PDF (Apache Setup (Part 1)) I explained on how to install Apache web server. On this PDF Apache Setup (Part 2) I will show how secure apache and install the modules. In the PDF there is example about limiting apache. Example: Limiting Apache User Rights One of the biggest offenders is the root user. This can lead to some serious issues or say both Apache and MySQL are run by the same user/group. If there is a hole in one, it can lead to an attack on the other. The best scenario is to make sure Apache is run as the user and group apache. To make this change, open the httpd.conf file and check the lines that read. User Group Change these entries to: User apache Group apache if you get any errors indicating the group or user does not exist, you’ll have to create them.   File Name: Apache Setup (Part 2).pdf Date Created: 06/15/10 File Size: 1106KB Download Now