Search found 50 matches

by hrdedicated
Sat Jun 01, 2013 12:23 pm
Forum: System Security
Topic: PRM Installation
Replies: 0
Views: 1303

PRM Installation

PRM monitors the process table on a given system and matches process id's with set resource limits in the config file or per-process based rules. Process id's that match or exceed the set limits are logged and killed; includes e-mail alerts, kernel logging routine and more INSTALLATION: ============...
by hrdedicated
Sat Jun 01, 2013 12:22 pm
Forum: System Security
Topic: How to optimization Apache
Replies: 0
Views: 1229

How to optimization Apache

Apache optimization Introduction: Apache 2.x is a general-purpose webserver, designed to provide a balance of flexibility, portability, and performance. Although it has not been designed specifically to set benchmark records, Apache 2.x is capable of high performance in many real-world situations. C...
by hrdedicated
Sat Jun 01, 2013 12:17 pm
Forum: Hostripples dedicated Servers (Linux/Windows)
Topic: Brute Force Detection
Replies: 0
Views: 1692

Brute Force Detection

Brute Force Detection Introduction: BFD is a modular shell script for parsing application logs and checking for authentication failures. It does this using a rules system where application specific options are stored including regular expressions for each unique auth format. The regular expressions ...
by hrdedicated
Sat Jun 01, 2013 12:16 pm
Forum: Hostripples dedicated Servers (Linux/Windows)
Topic: How to Secure Linux Servers
Replies: 0
Views: 1123

How to Secure Linux Servers

How to Secure Linux Servers: CSF : Introductions: Security configuration and set-up for Linux servers exposed to the internet: Any computer connected to the internet will require steps and precautions to be taken to reduce the exposure to hacker threats. Web, mail and DNS servers are especially vuln...
by hrdedicated
Sat Jun 01, 2013 12:15 pm
Forum: Hostripples dedicated Servers (Linux/Windows)
Topic: How to disable Telnet & Other Unused Services
Replies: 0
Views: 1177

How to disable Telnet & Other Unused Services

Disable Telnet & Other Unused Services Introduction: Telnet is an unsecured network protocol that facilitates remote login to a server via network connection. The protocol allows server to be located thousands of miles away from the administrator yet still can be managed even without physical co...
by hrdedicated
Sat Jun 01, 2013 12:14 pm
Forum: Hostripples dedicated Servers (Linux/Windows)
Topic: Disable Open DNS Recursion (DNS Server)
Replies: 0
Views: 1255

Disable Open DNS Recursion (DNS Server)

If you are running bind DNS server, then you might want to check your dns server statistics with dnstools.com. You dont want to allow recursive lookups to performed on your server other than local IP. It can also slowdown your server. Steps: 1. Login to server as root user. 2. Vi /etc/named.conf 3. ...
by hrdedicated
Sat Jun 01, 2013 12:13 pm
Forum: Hostripples dedicated Servers (Linux/Windows)
Topic: How to manage Exim mail queue
Replies: 0
Views: 1352

How to manage Exim mail queue

Exim Commands Introduction: Here are some useful things to know for managing an Exim server. Message-IDs and spool files. The message-IDs that Exim uses to refer to messages in its queue are mixed-case alpha-numeric, and take the form of: XXXXXX-YYYYYY-ZZ. Most commands related to managing the queue...
by hrdedicated
Sat Jun 01, 2013 12:12 pm
Forum: Hostripples dedicated Servers (Linux/Windows)
Topic: How to Prevent IP Spoofing
Replies: 0
Views: 1096

How to Prevent IP Spoofing

Prevent IP Spoofing Introduction: An IP (Internet Protocol) address is the address that reveals the identity of your Internet service provider and your personal Internet connection. The address can be viewed during Internet browsing and in all of your correspondences that you send. IP spoofing hides...
by hrdedicated
Sat Jun 01, 2013 12:08 pm
Forum: System Security
Topic: How to install PortsEntry on linux server PortsEntry
Replies: 0
Views: 1356

How to install PortsEntry on linux server PortsEntry

Install PortsEntry Introduction: Firewalls help us to protect our network from unsolicited intrusions. Using them we can choose which ports we want to be open and which one's we dont. Information is kept private by your organization and responsibility of individuals asociated. Nobody from the outsid...
by hrdedicated
Sat Jun 01, 2013 12:07 pm
Forum: System Security
Topic: Linux Environment Security : How to install ? LES
Replies: 0
Views: 1232

Linux Environment Security : How to install ? LES

LES (Linux Environment Security) Introduction: Linux Environment Security is intended as a facility to quickly & easily secure RedHat/RPM based environments. It does such by enforcing root-only permissions on system binaries (binaries that have no place being executed by normal users), enforcing...

Go to advanced search