<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / falko / tag / security</title>
<link>http://netvouz.com/falko/tag/security?feed=rss&amp;pg=1</link>
<description>falko&#39;s bookmarks tagged &quot;security&quot; on Netvouz</description>
<item><title>How to secure an SSL VPN with one-time passcodes and mutual authentication</title>
<link>http://www.howtoforge.com/ssl_vpn_one_time_passcodes_mutual_authentication</link>
<description>SSL-based VPNs were designed to eliminate the need for complex configurations on the user&#39;s PC. Unfortunately, that was before the dangers of public WiFi networks and tougher regulatory requirements came into being. Thanks to WiFi, many attacks that were difficult are now quite simple. In particular, a man-in-the-middle attack can intercept SSL-encrypted traffic, rendering SSL-based VPNs useless - even if it is protected by a typical one-time password system. The man-in-the-middle can easily feed the one-time password into the SSL-based VPN within the alloted time.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Mon, 02 Jul 2007 10:04:06 GMT</pubDate>
</item><item><title>How to secure WebDAV with SSL and Two-Factor Authentication | HowtoForge</title>
<link>http://www.howtoforge.com/webdav_with_ssl_and_two_factor_authentication</link>
<description>This guide documents how to configure a WebDAV resource using SSL and two-factor authentication and how to access that resource from Windows, Linux and Mac.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Wed, 18 Apr 2007 11:30:38 GMT</pubDate>
</item><item><title>Installing ModSecurity2 On Debian Etch</title>
<link>http://www.howtoforge.com/apache2_mod_security_debian_etch</link>
<description>This article shows how to install and configure ModSecurity (version 2) for use with Apache2 on a Debian Etch system. ModSecurity is an Apache module that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Sun, 08 Jul 2007 11:50:14 GMT</pubDate>
</item><item><title>Introducing Remo - An Easy Way to Secure an Insecure Online Application with ModSecurity</title>
<link>http://www.howtoforge.com/remo_modsecurity_apache</link>
<description>Say you have a nasty application on your Apache webserver that has been installed by some people from the marketing department and you can neither remove nor patch it. Maybe it is a time problem, a lack of know-how, a lack of source-code, or possibly even political reasons. Consequently you need to protect it without touching it. There is ModSecurity, but they say this is only for experts. A straightforward alternative is Remo, a graphical rule editor for ModSecurity that comes with a whitelist approach. It has all you need to lock down the application.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Fri, 08 Jun 2007 10:09:50 GMT</pubDate>
</item><item><title>PHP-FPM/Nginx Security In Shared Hosting Environments (Debian/Ubuntu)</title>
<link>http://www.howtoforge.com/php-fpm-nginx-security-in-shared-hosting-environments-debian-ubuntu</link>
<description>If you want to use nginx and PHP-FPM for shared hosting environments, you should make up your mind about security. In Apache/PHP environments, you can use suExec and/or suPHP to make PHP execute under individual user accounts instead of a system user like www-data. There&#39;s no such thing for PHP-FPM, but fortunately PHP-FPM allows us to set up a &quot;pool&quot; for each web site that makes PHP scripts execute as the user/group defined in that pool. This gives you all the benefits of suPHP, and in addition to that you don&#39;t have any FTP or SCP transfer problems because PHP scripts don&#39;t need to be owned by a specific user/group to be executed as the user/group defined in the pool.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Sun, 25 Sep 2011 16:51:02 GMT</pubDate>
</item><item><title>Preventing Brute Force Attacks With BlockHosts On Debian Etch</title>
<link>http://www.howtoforge.com/blockhosts_debian_etch</link>
<description>In this article I will show how to install and configure BlockHosts on a Debian Etch system. BlockHosts is a Python tool that observes login attempts to various services, e.g. SSH, FTP, etc., and if it finds failed login attempts again and again from the same IP address or host, it stops further login attempts from that IP address/host. By default, BlockHosts supports services that use TCP_WRAPPERS, such as SSH, i.e. services, that use /etc/hosts.allow or /etc/hosts.deny, but it can also block other services using iproute or iptables.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Sun, 30 Sep 2007 10:14:14 GMT</pubDate>
</item><item><title>Preventing Brute Force Attacks With Fail2ban On Debian Etch</title>
<link>http://www.howtoforge.com/fail2ban_debian_etch</link>
<description>In this article I will show how to install and configure fail2ban on a Debian Etch system. Fail2ban is a tool that observes login attempts to various services, e.g. SSH, FTP, SMTP, Apache, etc., and if it finds failed login attempts again and again from the same IP address or host, fail2ban stops further login attempts from that IP address/host by blocking it with an iptables firewall rule.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Tue, 01 May 2007 17:45:47 GMT</pubDate>
</item><item><title>Preventing Brute Force Attacks With Fail2ban On OpenSUSE 10.3</title>
<link>http://www.howtoforge.com/fail2ban_opensuse10.3</link>
<description>In this article I will show how to install and configure fail2ban on an OpenSUSE 10.3 system. Fail2ban is a tool that observes login attempts to various services, e.g. SSH, FTP, SMTP, Apache, etc., and if it finds failed login attempts again and again from the same IP address or host, fail2ban stops further login attempts from that IP address/host by blocking it with an iptables firewall rule.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Mon, 15 Oct 2007 07:04:56 GMT</pubDate>
</item><item><title>Secure Websites Using SSL And Certificates</title>
<link>http://www.howtoforge.com/secure_websites_using_openssl_and_apache</link>
<description>This article will guide you through the entire process of setting up a secure website using SSL and digital certificates. This guide assumes that you already have a fully functional (and configured) server running Apache, BIND, and OpenSSL. Just as a side note, this guide was written based on a Fedora Core 6 distribution, but should be the same for most other distros out there.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Fri, 18 May 2007 09:46:20 GMT</pubDate>
</item><item><title>Setting Up ProFTPd + TLS On Debian Etch</title>
<link>http://www.howtoforge.com/proftpd-tls-debian-etch</link>
<description>FTP is a very insecure protocol because all passwords and all data are transferred in clear text. By using TLS, the whole communication can be encrypted, thus making FTP much more secure. This article explains how to set up ProFTPd with TLS on a Debian Etch server.</description>
<category domain="http://netvouz.com/falko?category=6101149612142001527"></category>
<author>falko</author>
<pubDate>Fri, 14 Dec 2007 11:32:06 GMT</pubDate>
</item></channel></rss>