Tag: security

The Future of Web Services Security:

Sun Microsystems’ Eve Maler, chair of the Security Work Plan Working Group of WS-I (Web Services Interoperability Organization), is a leading mover and shaker in the world of Web services security. She co-founded, formerly chaired, and is currently coordinating editor of the SAML (Security Assertion Markup Language) committee, which brought together divergent XML-based security efforts in an effort to develop a common standard.

Defense In Depth – A Layered Approach Network Security

External information access from partners and employees is a very important aspect in the design of security. Corporations need to be assured that their critical servers are safe from different internet threats. Additionally, because the Web is worldwide, it is impossible to create a global agreement on what traffic is inappropriate and how that traffic should be regulated. A major problem IT departments face is how to defend critical servers from hostile network traffic and network addresses. How do we add layers of security to protect our internet servers and internal systems?

Network Security with -proc-sys-net-ipv4

In additional to firewall rulesets, the /proc filesystem offers some significant enhancements to your network security settings. Unfortunately, most of us are unaware of anything beyond the vague rumors and advice we’ve heard about this beast. In this article, we’ll review some of the basic essentials of the /proc/sys/net/ipv4 filesystem necessary to add to the overall network security of your Linux server.

Security Basics

Most cracks involve a tool as simple as a Trojan horse, which will leave a backdoor account open to the cracker. Young teenagers have been known to utilize such tools effectively, even against corporate giants. It is because of these types of attacks that users (even if it is your family hooked up to a small LAN on a cable modem) need to be educated about some basics that will stop most typical hackers. First of all, lets talk about passwords. Many of these tools that I have mentioned will expose null passwords. This means that if you do not enter a password when you log in, these scanners will show that to the potential offender, and then the hacker can easily take control of your system.

Back To Top