Skip to main content

Posts

Unfortunately hackers target small sites more than they do larger ones and for good reason: Smaller sites are usually not really secured like corporate sites are. Smaller sites often don’t have the resources to realize they have been exploited. There are smaller sites than large ones. If your site was hacked in a malicious manner you have two options. You can sit around and think back on all the ways you should have hardened your site against attacks or you can start cleaning up the mess and get your site back on track. While intending college one instructor said that if a hacker wants your information they will get. There is no network that can be 100% secure because there is always a way to get in to a network. You just need to know how you’re going to bring your company business web site back up because time is money. Like what your reading then download the PDF.     Title: Repair a hacked web site File Name: Repair a hacked web site.pdf File Type: PDF ...

Opimtize your internet connection

PC World has a great guide to tweaking the more advanced settings of your router for optimizing your router for VoIP and video, though the same rules can apply for any bandwidth-heavy activity like file sharing or video games. PC World also mentions a few settings we haven't touched on before, like using a DMZ, splitting your traffic between two wireless networks, wireless multimedia extensions, and wireless intelligent stream handling. All these settings basically help perform the same task and allocate more of your bandwidth to one important activity whenever they're going on, so all the other things you're doing don't suck it up and leave you with poor quality video chats. They also discuss where to find these settings on six of today's most popular routers, so even if you haven't delved into your router's settings too often, it should be easy enough to follow along. Hit the link to check out the guide. How to Optimize Your Router for VoIP...

* Fun Bonus *

As you visit wireshark.org you just expect a regular web site, but with information. Sometimes web developers add a comment on there source code and sometimes it's funny and other times it's not. A few days ago I was viewing web pages in the terminal. This is what I had found on wireshark.org. See screenshot below. The comment says " "Girl, you're a beautiful animal. I'll put a tag on your ear." - Cracker " I'm not too sure if web developers did it on purpose, but who knows I thought it was funny. To view it yourself go to wireshark.org, view the source for the web page, and scroll all the way to the bottom. Finally look at the comment section.

Using Lynis Audit Tool

Lynis is a Unix-based auditing tool. It assists an auditor in scanning an Unix system and available software. The software will try detecting installed packages, configuration errors, security issues and system information. The software helps with automated auditing and software patch management, and also vulnerability/malware scanning of Unix-based systems. It can be started from (USB stick, cd/dvd). Intended audience is system auditors, security specialists, penetration testers, system/network managers. (From: http://en.wikipedia.org/wiki/Lynis ). Download the PDF to read more about it. Title: Using Lynis Audit Tool File Name: Using Lynis Audit Tool.pdf File Type: PDF File Size: 1.41 MB Download Now

Protecting Systems Logs & Controlling User Accounts

Protecting Systems Logs In Linux your log files are located in the “/var/log/*log”. If a hacker does not want leave there tracks they would delete these files after they were done. One way to protect these files is to restrict access to log directories and files by normal users. Use this command “chmod 640 /var/log/*log”. To read more download the PDF Title: Protecting Systems Logs & Controlling User Accounts File Name: PSLCUA.pdf File Type: PDF File Size: 819 KB Download Now

Disabling unnecessary services

Chkconfig Enabling or disabling services on Linux it is simple to do. Like in windows you go to the run command type "msconfig" and go to the service tab and start enabling or disabling services. The only problem with the Microsoft version is that the operating system does not allow selecting which services to start when in safe mode. Linux version of this does allow you select which services to be turned on or off. The chkconfig is used to manipulate the run level links at boot time. It can be thought of as a fron-tend to insserv. Chkconfig can run in six different modes: terse list mode, set mode, edit mode, list mode, add mode and delete mode. The last three modes were added for compatibility reasons. (From: http://man-wiki.net/index.php/8:chkconfig ). Read the PDF to read more about it.     Title: Chkconfig Settings File Name: Chkconfig.pdf File Type: PDF File Size: 1.17 MB  Download Now

Protecting the Kernel

Standard Linux Kernel When installing Linux it comes with the default Linux kernel compiled which is okay for most user, but when it comes to protect your data it is also good idea to build your own secure configuration. To get latest state or beta version of the kernel go to http://www.kernel.org/ Note: if you’re still unsure or feel uneasy if you want to do this then this is not for you. To get full details on compiling Linux Kernel you can visit: http://www.digitalhermit.com/linux/Kernel-Build-HOWTO.html#CONFIGURATION-INTRO http://www.faqs.org/docs/Linux-HOWTO/Kernel-HOWTO.html For security reason the DTS server kernel configuration can not be shown.