Zeus Web Server and HP Secure Linux
|
|
|
- Ambrose Stewart
- 10 years ago
- Views:
Transcription
1 Zeus Web Server and HP Secure Linux Andy Pearce Running the Zeus Web Server with HP Secure OS software for Linux Andy Pearce There s no let-up in either the revealing of new web server vulnerabilities or the quest for more and better security of web server software. This is the past, and the future. The web site is the internet front-line for any organization; the face, the first impression we get. Web sites belonging to organizations giving a good impression invariably have two important qualities: 1. Speed (responsiveness) 2. Confidence (in the brand and company or organization) To create a secure web service solution for general purpose, fast and scalable for the real world, engineers from HP and Zeus Technology have integrated Zeus Web Server (ZWS) into HP Secure OS software for Linux, or HP Secure Linux, environment. Here we will describe the steps needed to protect ZWS components and a database application within HP Secure Linux. We considered security implications of different schemes for separating application components in compartments. This investigation precedes any official release of ZWS for HP Secure Linux. 1
2 Imperatives Lower operational cost efficiencies Build consumer confidence and trust Responsiveness - the perception of quick response, is a major factor in providing an impressive service. Punters are paying the extra for broadband. Now its time for the busier web sites to do everything they can to offer a high performance service. Investment in network, application servers and back-end applications often dwarfs the expenditure on the web server itself. However, the web server and intelligent HTTP/HTTPS traffic management can make a remarkable contribution to efficiency improvement, which in turn will reduce operating costs. Confidence many people don t really trust the web. They may ask: - Who am I dealing with here? - Is my information secure? - Are they going to rip-off information from my PC and use it against my wishes? - Could a fraudster get my credit card from this site? - What happens to my personal details if they go out of business? E-commerce requires the building of user trust and confidence in the brand being presented on the web site. Conversely, the publicity from compromised web site security and theft of customer s personal data destroys trust and confidence in that brand. 2
3 Risk management - Defensive security of publicly accessible servers calls for risk management analysis [Garfinkel, Spafford, 1991]. But what is the risk? What threat does a hacker attack pose? To some, web site attacks are just an annoyance. Others argue: Web site defacement is just the tip of an iceberg of a far greater problem. If these guys can do it for fun, how many more are doing it for criminal gain? Individual system administrator s professional credibility is attacked, which may affect your job! The brand being attacked can receive negative publicity, which may affect sales and the brand s market value. Public trust in the company s ability to manage its own security, and hence security of private customer information, is undermined. If these attackers can stomp all over this web site, they ve probably got my credit card number, , password, and address, right? General public, and investor, confidence in the web as a medium for electronic commerce is undermined. An insecure web presence cannot survive commercially. These arguments create uncertainty and slow down growth and investment in web services. Only successful attacks are publicized no-one hears about the attacks that are thwarted, or the administrators quietly keeping their systems secure year after year. 3
4 Our servers are now overloaded. Caution: Slow web service can ruin your day! Even large, expensive infrastructures can fail to scale. Twin Peaks Business credibility also requires the web site can actually do what its supposed to! Busy web services must be able to scale up How many simultaneous connections can be handled? How much headroom is there to handle peaks? What s the rate that headroom gets taken up, and is there a suitable capping mechanism? How many virtual web sites can be managed in a hosting environment? The scalability of any e-commerce solution can be affected: The network supplied by your ISP or telephone company The web server The back-end and middleware software products; application servers, databases, etc. Here we look at building a relatively low cost, high performance solution stack that can scale up; Zeus Web Server PHP (application level) MySQL (database) HP Secure Linux 4
5 Make it snappy! What - too cheap to buy a fast server? Oh! So wasting my time s not a problem? We all hate slow web servers. Speed we hate slow response. Anger and frustration are common reactions to having to wait: - What? Are they too cheap to buy a decent web infrastructure? - Do they think wasting my time is better than upgrading to something that can respond half quickly? Broadband makes slow web sites stand out even more, users will become more selective. Many web sites are geared to handle their normal rates of web requests. They need more headroom to be able to deal with high peaks that occur when something attracts large numbers of people to their site. Two well-known web servers that HP recommends are Apache and Zeus. The ubiquitous Apache Web Server is what users often start with on Linux, many applications come with an Apache server, and HP has included an Apache web server with HP Secure Linux. However, to grow, whilst keeping operational costs low, requires more efficient web server software as well as high performance machines. This is where Zeus comes in. If you have a busy web site, or you re doing mass webhosting, Zeus excels. 5
6 Zeus Speed - transactions/sec Scalability - simultaneous connections - headroom - number of virtual servers Manageability 1. Security: With SSL as standard, built-in security features to combat DDOS, and virus/worm attacks, ZWS is chosen for secure web solutions. ZWS can protect Microsoft IIS web server from Nimbda and CodeRed virii. 2. Management: The Administration GUI features are in line with HP s approach to simplification of overall management of web infrastructure, whether that s for hosting many web sites, or running a very busy web site. 3. Clustering: ZWS has clustering admin capabilities built-in as standard. No barriers to scale-up as web services are split across many servers. 4. Efficiency: The efficiency of the ZWS non-blocking IO state machine, and decoupled service processes gives its well-renowned speed and scalability. HP conducted SSLPerf benchmarks with Zeus on Itanium 2 running HP-UX. The scaling of measurements with 1 and 2 cpu give an indication of the efficiency of the Zeus Web Server. SSLPerf results: 1 CPU 2 CPU scaling (SSL transactions/sec.) Zeus: % Apache: % The numbers will be lower on IA32 Linux servers but the scaling is similar. 6
7 Call to action Understand the dangers Evolve the barriers Follow the advisories Open security measures Build trust Building trust - Call to action: Convince yourself: attacker threats to business assets are real. Don t confront the attacker with rhetoric just quietly erect the barriers that make attack less worthwhile. Stay tuned to the advisories, stay ahead. This is the best way to know the enemy. Tell the customer what you can to reassure them about security investments you make, without giving your potential attacker useful information. Build trust with your customers and business partners. Its likely there will always be exploits against individual applications running on any web server. HP Secure Linux allows you to contain applications so that if a break-in does occur, the attacker cannot easily damage other parts of your system. 7
8 Compartments Separate applications Separate file system Define allowed interaction Isolate vulnerabilities HP Secure Linux: One central idea behind using HP Secure Linux for a web server and applications is compartmentalization. Using compartments to separate the web server from the other services, you can limit access to your system as a result of a vulnerability in one component. Applications can be installed in the main file system, or in their own file tree within a compartment. In the former case, compartment rules may still restrict what resources a process is allowed to access. So even though the application is installed in its normal root location, the process may still only be granted read access to that file system. In the latter case, the processes can be run in a chroot d environment with no visibility of files outside the compartment. We can configure Zeus to run as user:nobody, group:nobody. When you list the zeus processes you will see one zeus.web process running as root. It needs to do this in order to obtain ports controlled by root; e.g., port 80. Other spawned zeus.web processes run the web service, and they can run as nobody. It is possible to run one part of the Zeus web server in one compartment, and another part in a different compartment. For example, a separate compartment for the administration server to be accessed from a dedicated admin LAN. 8
9 Steps to integration 1. Validate (SYSHI) 2. Create compartment 3. Install 4. Create Rules 5. Test Validation the easiest way to start is to validate that the application will run on HP Secure Linux in System High (SYSHI) compartment. Copy the files to be installed (use sftp if remote) Login with TLX_ADM and TLX_PRC capabilities; e.g. as tlinuxadm su to root, and switch to the SYSHI compartment Untar and install Zeus as normal; e.g. to /usr/local/zeus As we are in System High, we don t need to define any rules to run. Zeus will run as normal. System High is a good starting place to test out that the application has the correct environment to run, before taking the next step to contain the application within a compartment. Test that it all works as expected Shut down the service and uninstall Zeus 9
10 Contain the application Create compartment Define rules COMPARTMENT zeus -> HOST * PORT 53 METHOD UDP NETDEV any HOST * PORT 53 -> COMPARTMENT zeus METHOD UDP NETDEV any HOST * COMPARTMENT zeus PORT 80 METHOD TCP NETDEV any HOST * COMPARTMENT zeus PORT 443 METHOD TCP NETDEV any HOST * COMPARTMENT zeus PORT 9090 METHOD TCP NETDEV any Create compartment a single command creates the compartment; tlcompadd zeus. The Zeus Web Server needs to be able to resolve names, so it must have rules for accessing DNS via port 53. It also needs TCP access via port 80 (default HTTP location), port 443 (HTTPS), port 9090 (for Zeus Admin GUI interface). So the rules defining access to/from zeus location are simply: COMPARTMENT zeus -> HOST * PORT 53 METHOD UDP NETDEV any HOST * PORT 53 -> COMPARTMENT zeus METHOD UDP NETDEV any HOST * COMPARTMENT zeus PORT 80 METHOD TCP NETDEV any HOST * COMPARTMENT zeus PORT 443 METHOD TCP NETDEV any HOST * COMPARTMENT zeus PORT 9090 METHOD TCP NETDEV any 10
11 Running the Web Server File system - Copy files required Run compartment Seal compartment File system - The Zeus Web Server is very self-contained, and requires relatively few resources outside its own installed files. It was an easy decision, therefore to install the entire application within the file system contained within the compartment. The steps we took were: Install ZWS as normal within the new zeus compartment; /compt/zeus/zeus. Remove any startup scripts from the /etc/rc* directories. Make the appropriate edits to startup files within the zeus compartment; Copy over the files that ZWS requires that are not installed by tlcompadd in the compartment. Start the compartment this action starts the Zeus Web Server Seal the compartment (optional) prevents processes doing su root or any suid programs from running. You still take the normal precaution to have the web server agent run as nobody rather than root, but even if the web server is somehow compromised, the attacker only has access to files and processes within the zeus compartment. Even with root access the attacker cannot access files and processes in other compartments; e.g., a database. 11
12 Applications Add FastCGI (or CGI) Add PHP Create compartment(s) Experiment Installing FastCGI and PHP Applications that form part of the backend of a web server can be separately compartmented. They often require more system resources, and so are frequently not installed within a separate compartment file system. If an attacker breaks into a compartment via, say, a PHP vulnerability, they will have access to the FastCGI and PHP compartment processes only. They will not have access to the web server, web server files, or database processes. Apache uses an integrated mod_php approach to running PHP. Zeus uses FastCGI, and has been measured as 45% faster than Apache/mod_php. See for details. Install FastCGI Install PHP4 Configure Zeus to use PHP via FastCGI There are different options to consider when configuring this combination. One approach is to have FastCGI and PHP4 running in a single compartment. Create rules to access the FastCGI runner from the web server. Modify the startup and shutdown scripts within the compartment and remove any scripts in the /etc/rc* system directories. This gives the best performance. 12
13 MySQL Same approach Install in root file system Rules to enable access from PHP MySQL MySQL is a very popular database used by many web applications. PHP and MySQL are often used together as a combination with Zeus, or Apache. We investigated how to integrate Zeus with PHP and MySQL within HP Secure Linux. We repeated the approach to installing MySQL; i.e., start with an installation within System High compartment. 13
14 Familiarity Pilot the application Define the issues (for your circumstances) Security is knowledge Experience (gaining familiarity with the OS environment) We ve seen that installing a single application is fairly straightforward. When you come to install a number of applications that need to work together as a unified system, its likely the possibilities will become more complex. Especially if this the solution is designed to be general purpose. Our recommendation is to pilot a complex integration with the applications and data you are likely to use. It does take some time to get used to the security in HP Secure Linux. As the OS environment becomes more familiar, spend time trying different approaches to separating components. Weigh up the advantages of different approaches to your system. Choose and adopt the approach that suits you best. The approach you choose will take into account the threat you perceive from security advisories against the applications you use Know the enemy and know yourself: One hundred challenges without danger; Know not the enemy and yet know yourself: One triumph for one defeat; Know not the enemy and know not yourself: Every challenge is certain peril. Sun Tzu 14
15 Conclusion Efficiency (performance) to drive lower cost of operation. Evolution of security measures to build customer confidence Conclusion A repeatable methodology for installing a new application in HP Secure Linux has been discussed. Installing an application within a compartment isolates the processes and resources. An attacker has limited access to the rest of the system if a vulnerability is exploited. The approach for integrating several components to work together is more complex and requires a greater understanding of the system needs. We have discussed the needs for a secure web service solution with low cost of operation. HP Secure Linux with the Zeus Web Server and applications such as PHP and MySQL is one such combination that can be adapted or extended to meet these needs. More complex integration requires some knowledge of potential hazards from exposure to vulnerability in any component. Security is constantly being challenged. Customer confidence in a web presence demands both responsiveness and security. References: Garfinkel, Spafford, Practical Unix & Internet Security, O Reilly, Zeus: PHP: FastCGI: MySQL: HP Secure Linux: 15
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
Asia Web Services Ltd. (vpshosting.com.hk)
. (vpshosting.com.hk) Getting Started guide for VPS Published: July 2011 Copyright 2011 Table of Contents Page I. Introduction to VPS 3 II. Accessing Plesk control panel 4 III. Adding your domain in Plesk
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
Introduction... 1. Connecting Via FTP... 4. Where do I upload my website?... 4. What to call your home page?... 5. Troubleshooting FTP...
This guide is designed to show you the different ways of uploading your site using ftp, including the basic principles of understanding and troubleshooting ftp issues. P a g e 0 Introduction... 1 When
Host/Platform Security. Module 11
Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic
Higher National Unit specification: general information
Higher National Unit specification: general information Unit code: H16S 35 Superclass: CB Publication date: March 2012 Source: Scottish Qualifications Authority Version: 01 Unit purpose This Unit is intended
E-Commerce for IT Advanced. Louis Aguila & Matt Burt
Advanced Louis Aguila & Matt Burt Class Objectives To explore Microsoft Internet Information Services (IIS) use and troubleshooting Basic E-Commerce site setup in IIS Use of Application Pools and settings
Plesk Panel HEAnet Customer Guide
Plesk Panel HEAnet Customer Guide Version 1.7 September 2013 HEAnet has migrated its Webhosting Service from the old Linux/Apache/MySQL/PHP (LAMP) set up to a control panel environment based on Parallel
MAGENTO HOSTING Progressive Server Performance Improvements
MAGENTO HOSTING Progressive Server Performance Improvements Simple Helix, LLC 4092 Memorial Parkway Ste 202 Huntsville, AL 35802 [email protected] 1.866.963.0424 www.simplehelix.com 2 Table of Contents
Monitoring Best Practices for
Monitoring Best Practices for OVERVIEW Providing the right level and depth of monitoring is key to ensuring the effective operation of IT systems. This is especially true for ecommerce systems like Magento,
Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index
Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Multi-site Best Practices
DS SOLIDWORKS CORPORATION Multi-site Best Practices SolidWorks Enterprise PDM multi-site implementation [SolidWorks Enterprise PDM 2010] [] [Revision 2] Page 1 Index Contents Multi-site pre-requisites...
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Joomla Security - Introduction
Joomla Security - Introduction Joomla Security At The Webhost Modern web servers come in all shapes, sizes and hues, hence web server based security issues just cannot be resolved with simple, one-size-fits-all
Lesson 7 - Website Administration
Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time
Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
Hardening MySQL. Maciej Dobrzański maciek at psce.com @MushuPL http://www.psce.com/
Hardening MySQL Maciej Dobrzański maciek at psce.com @MushuPL http://www.psce.com/ In this presentation Database security Security features in MySQL The ugly truth Improving security DATABASE SECURITY
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Remote Unix Lab Environment (RULE)
Remote Unix Lab Environment (RULE) Kris Mitchell [email protected] Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Performance Evaluation of Shared Hosting Security Methods
Performance Evaluation of Shared Hosting Security Methods Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan Computer Engineering Department, Sharif University of Technology, International Campus,
Linux Server Support by Applied Technology Research Center. Proxy Server Configuration
Linux Server Support by Applied Technology Research Center Proxy Server Configuration We configure squid for your LAN. Including transparent for HTTP and proxy for HTTPS. We also provide basic training
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Directory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
SECURE YOUR NETWORK WITH FIREWALL BUILDER
SECURE YOUR NETWORK WITH FIREWALL BUILDER firewall isolates a trusted, secure internal network from another network like the Internet, which is not regarded as either trusted or secure. Firewall Builder
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com
CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
DDoS Protection on the Security Gateway
DDoS Protection on the Security Gateway Best Practices 24 August 2014 Protected 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
PHP on IBM i: What s New with Zend Server 5 for IBM i
PHP on IBM i: What s New with Zend Server 5 for IBM i Mike Pavlak Solutions Consultant [email protected] (815) 722 3454 Function Junction Audience Used PHP in Zend Core/Platform New to Zend PHP Looking to
GEM Network Advantages and Disadvantages for Stand-Alone PC
Possible Configurations Turns your Contacts into a Business Network focussed on you GEM can be configured to run in many different ways. From simple stand-alone PC s or Mac s, through Client Server on
Cisco Application Control Engine in the Virtual Data Center
Cisco Application Control Engine in the Virtual Data Center Q. What is Cisco Application Control Engine (ACE) the Virtual Data Center (AVDC)? A. AVDC is a solution that focuses on integrating key data
Configuration Manual English version
Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
WINDOWS AZURE EXECUTION MODELS
WINDOWS AZURE EXECUTION MODELS Windows Azure provides three different execution models for running applications: Virtual Machines, Web Sites, and Cloud Services. Each one provides a different set of services,
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
White paper. How to choose a Certificate Authority for safer web security
White paper How to choose a Certificate Authority for safer web security Executive summary Trust is the cornerstone of the web. Without it, no website or online service can succeed in the competitive online
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Technical and Operational Requirements for Approved Scanning Vendors (ASVs) Version 1.1 Release: September 2006 Table of Contents Introduction...1-1 Naming
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Business Case for a DDoS Consolidated Solution
Business Case for a DDoS Consolidated Solution Executive Summary Distributed denial-of-service (DDoS) attacks are becoming more serious and sophisticated. Attack motivations are increasingly financial
IP Application Security Manager and. VMware vcloud Air
Securing Web Applications with F5 BIG- IP Application Security Manager and VMware vcloud Air D E P L O Y M E N T G U I D E Securing Web Applications Migrating application workloads to the public cloud
Parallels Plesk Panel 11 for your Linux server
Getting Started Guide Parallels Plesk Panel 11 for your Linux server Getting Started Guide Page 1 Getting Started Guide: Parallels Plesk Panel 11, Linux Server Version 1.1 (11.1.2012) Copyright 2012. All
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Linux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
Network Monitoring with Xian Network Manager
Network Monitoring with Xian Network Manager Did you ever got caught by surprise because of a network problem and had downtime as a result? What about monitoring your network? Network downtime or network
ReadyNAS Remote Troubleshooting Guide NETGEAR
ReadyNAS Remote Troubleshooting Guide NETGEAR June 2010 Symptom: I cannot see any shares from my PC This symptom can be caused by a variety of reasons. To diagnose the problem, please make sure your are
DMZ Gateways: Secret Weapons for Data Security
A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE
Quickstart Guide. First Edition, Published September 2009. Remote Administrator / NOD32 Antivirus 4 Business Edition
Quickstart Guide First Edition, Published September 2009 Remote Administrator / NOD32 Antivirus 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
Windows Server Performance Monitoring
Spot server problems before they are noticed The system s really slow today! How often have you heard that? Finding the solution isn t so easy. The obvious questions to ask are why is it running slowly
Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers
Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers Seyed Ali Mirheidari 1, Sajjad Arshad 2, Saeidreza Khoshkdahan 3, Rasool Jalili 4 1 Computer Engineering Department, Sharif
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
Securing Database Servers. Database security for enterprise information systems and security professionals
Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Cisco Secure Access Control Server 4.2 for Windows
Cisco Secure Access Control Server 4.2 for Windows Overview Q. What is Cisco Secure Access Control Server (ACS)? A. Cisco Secure ACS is a highly scalable, high-performance access control server that operates
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Cheap and efficient anti-ddos solution
Cheap and efficient anti-ddos solution Who am I? Alexei Cioban Experience in IT 13 years CEO & Founder IT-LAB 7 years IT trainings 5 years 2 About company Year of foundation - 2007 12 employees www.it-lab.md
What is new in Switch 12
What is new in Switch 12 New features and functionality: Remote Designer From this version onwards, you are no longer obliged to use the Switch Designer on your Switch Server. Now that we implemented the
Is Skype Safe for Judges?
Is Skype Safe for Judges? By Martin Felsky, PhD, JD, for the Judges Technology Advisory Committee, Canadian Judicial Council, 1 Version 2.0 July 6, 2010 In this article I will try to help judges understand
How To Use Ngnix (Php) With A Php-Fpm (Php-Fmm) On A Web Server (Php5) On Your Web Browser) On An Ubuntu Web Server On A Raspberry Web 2.5 (Net
Powering Magento with Ngnix and PHP-FPM Written by: Yuri Golovko Alexey Samorukov Table of Contents INTRODUCTION WHY YOU SHOULD CONSIDER NGNIX NGNIX AND STATIC CONTENT HOW TO USE NGNIX NGNIX SYSTEM REQUIREMENTS
Project 2: Penetration Testing (Phase II)
Project 2: Penetration Testing (Phase II) CS 161 - Joseph/Tygar November 17, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Project 2: Firewall Design (Phase I)
Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Securing shared hosting using CageFS
Securing shared hosting using CageFS Igor Seletskiy CEO, CloudLinux Linux OS based on RHEL source RPMs Binary compatible with RHEL 5.x/6.x and CentOS 5.x/6.x Made for Shared Hosting Companies Focus on
BEST PRACTICES. Systems Management. www.kaspersky.com
BEST PRACTICES www.kaspersky.com 2 YOUR GUIDE TO SYSTEMS MANAGEMENT BEST PRACTICES. Enhance security and manage complexity using centralized IT management tools. Unpatched vulnerabilities in popular applications
PRESENTS... Reasons to Switch from SourceSafe: How to Make Your Life Easier with SourceAnywhere Standalone
Standalone PRESENTS... Reasons to Switch from SourceSafe: How to Make Your Life Easier with SourceAnywhere Standalone Most developers are familiar with Visual SourceSafe. It's a popular version control
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Parallels Plesk Automation
Parallels Plesk Automation Contents Get Started 3 Infrastructure Configuration... 4 Network Configuration... 6 Installing Parallels Plesk Automation 7 Deploying Infrastructure 9 Installing License Keys
shortcut Tap into learning NOW! Visit www.informit.com/shortcuts for a complete list of Short Cuts. Your Short Cut to Knowledge
shortcut Your Short Cut to Knowledge The following is an excerpt from a Short Cut published by one of the Pearson Education imprints. Short Cuts are short, concise, PDF documents designed specifically
Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software
FAST, RELIABLE, & JUST WORKS! White Paper Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software Proxy Networks, Inc. 877-PROXY-US or 617-453-2700 www.proxynetworks.com
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
Stop DDoS Attacks in Minutes
PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)
MarkLogic Server. Database Replication Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved.
Database Replication Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Database Replication
Terminal Server Guide
Terminal Server Guide Contents What is Terminal Server?... 2 How to use Terminal Server... 2 Remote Desktop Connection Client... 2 Logging in... 3 Important Security Information... 4 Logging Out... 4 Closing
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
NetIQ Access Manager 4.1
White Paper NetIQ Access Manager 4.1 Performance and Sizing Guidelines Performance, Reliability, and Scalability Testing Revisions This table outlines all the changes that have been made to this document
Securing Your Business s Bank Account
Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer
Getting Started With Your Virtual Dedicated Server. Getting Started Guide
Getting Started Guide Getting Started With Your Virtual Dedicated Server Setting up and hosting a domain on your Linux Virtual Dedicated Server using cpanel. Getting Started with Your Virtual Dedicated
Virtual Machine daloradius Administrator Guide Version 0.9-9
Virtual Machine daloradius Administrator Guide Version 0.9-9 May 2011 Liran Tal of Enginx Contact Email: daloradius Website: Enginx website: [email protected] http://www.daloradius.com http://www.enginx.com
