Tag: security

2259 Our security auditor is an idiot. How do I give him the information he wants? 2011-07-22T22:44:34.060

579 How do I deal with a compromised server? 2011-01-02T21:31:27.843

356 How do you search for backdoors from the previous IT person? 2010-08-18T15:04:36.423

286 What permissions should my website files/folders have on a Linux webserver? 2012-02-06T01:50:32.703

204 Heartbleed: What is it and what are options to mitigate it? 2014-04-08T00:26:18.347

196 Is it normal to get hundreds of break-in attempts per day? 2011-03-08T11:26:32.320

172 I am under DDoS. What can I do? 2013-08-19T09:14:58.037

116 How does CTRL-ALT-DEL to log in make Windows more secure? 2009-05-02T00:51:23.773

115 Possible to change email address in keypair? 2011-09-07T23:12:11.767

104 How to handle security updates within Docker containers? 2014-07-08T21:54:39.933

103 SSH keypair generation: RSA or DSA? 2009-07-13T19:18:06.140

102 Why should I firewall servers? 2010-11-12T21:11:17.980

101 How can I implement ansible with per-host passwords, securely? 2013-12-09T11:49:48.640

92 Tips for Securing a LAMP Server 2010-12-14T01:52:03.740

92 Does drilling a hole into a hard drive suffice to make its data unrecoverable? 2017-08-16T06:27:01.017

87 "POSSIBLE BREAK-IN ATTEMPT!" in /var/log/secure — what does this mean? 2011-04-17T18:17:13.757

87 Heartbleed: how to reliably and portably check the OpenSSL version? 2014-04-07T23:51:37.210

81 Dealing with HTTP w00tw00t attacks 2010-03-24T05:33:49.690

81 REJECT vs DROP when using iptables 2010-07-04T09:49:53.053

79 How to view all ssl certificates in a bundle? 2014-04-23T18:15:01.333

78 How to test if my server is vulnerable to the ShellShock bug? 2014-09-25T14:25:21.157

76 How do I protect my company from my IT guy? 2011-06-24T18:47:29.113

71 OpenVPN vs. IPsec - Pros and cons, what to use? 2010-11-17T13:41:13.630

68 How to add a security group to a running EC2 Instance? 2009-07-07T14:54:27.877

66 What steps do you take to secure a Debian server? 2009-05-23T20:49:05.033

65 What is the difference between /sbin/nologin and /bin/false? 2013-06-28T04:58:22.993

64 Are IP addresses "trivial to forge"? 2009-12-03T17:53:12.440

64 Does changing default port number actually increase security? 2011-09-28T19:04:23.093

64 Why is SSH password authentication a security risk? 2011-11-24T12:12:36.410

64 Linux: productive sysadmins without root (securing intellectual property)? 2016-02-01T18:20:35.917

64 A previous IT worker probably left some backdoors. How can I eliminate them? 2017-01-25T09:00:51.870

62 Heartbleed: are services other than HTTPS affected? 2014-04-08T11:21:04.433

62 How to decide where to purchase a wildcard SSL certificate? 2014-05-28T20:32:28.657

58 How do I grant start/stop/restart permissions on a service to an arbitrary user or group on a non-domain-member server? 2010-10-04T13:16:11.460

57 How to grant network access to LocalSystem account? 2010-04-26T14:19:49.223

57 Why would I need a firewall if my server is well configured? 2011-02-08T12:50:18.337

57 Is it OK to set up passwordless `sudo` on a cloud server? 2014-03-09T21:40:46.107

56 Reinstall after a Root Compromise? 2009-05-08T09:32:30.923

56 How do you manage your passwords? 2009-06-07T05:32:35.180

55 Mysterious visitor to hidden PHP page 2012-04-04T22:57:57.990

52 How to inspect remote SMTP server's TLS certificate? 2010-04-12T15:18:55.200

50 The IT Manager is Leaving - What do I lockdown? 2009-06-22T09:31:39.947

50 Why not block ICMP? 2009-11-15T20:15:26.440

50 Linux: set up for remote sysadmin 2016-09-26T11:54:41.967

49 Preventing brute force attacks against ssh? 2009-05-04T17:46:04.877

49 How can I allow one user to su to another without allowing root access? 2009-06-02T15:13:43.487

49 Are zipped EXE files harmless for Linux servers? 2016-12-22T08:49:54.673

48 Why do I have to edit /etc/sudoers with visudo? 2009-06-16T01:50:19.913

48 How to check if an RSA public / private key pair match 2012-09-11T16:24:06.423

44 What Should be the Permissions of Apache SSL Directory, Certificate, and Key? 2010-12-27T17:53:48.870

43 How to hide a password passed as command line argument? 2014-05-02T15:30:37.813

41 What's best practice for communication between Amazon EC2 instances? 2011-01-27T16:08:28.610

41 Is the PHP option 'cgi.fix_pathinfo' really dangerous with Nginx + PHP-FPM? 2014-09-11T17:35:27.857

40 What are best practices for managing SSH keys in a team? 2013-01-23T16:07:05.523

40 I updated my CentOS 7 system. Why is Meltdown/Spectre only partially mitigated? 2018-01-05T16:58:53.640

39 Got Hacked. Want to understand how 2010-05-06T03:14:56.817

39 What are the exact protocol level differences between SSL and TLS? 2010-09-06T20:10:10.130

39 Is it safe for a production server to have make installed? 2014-05-15T17:46:43.563

38 What do you do about staff and personal laptops? 2010-11-25T15:16:42.113

38 Why was I able to delete a file owned by root in my home directory without being root? 2015-10-05T21:07:01.097

38 How can I stop the Windows Recovery Environment being used as a back door? 2017-10-10T00:53:42.810

37 How useful is mounting /tmp noexec? 2009-10-07T23:43:37.503

37 Windows XP PCs in company network 2017-05-16T13:02:50.780

37 Why does AWS recommend against public S3 buckets? 2017-12-16T22:44:58.860

36 Securing a fresh Ubuntu server 2009-04-30T08:10:42.797

36 How to remove strict RSA key checking in SSH and what's the problem here? 2009-05-08T11:34:43.593

36 How to check that an OpenVPN server is listening on a remote port without using OpenVPN client? 2011-04-22T09:01:13.223

35 Reasons to disable / enable SELinux 2009-06-24T06:26:57.963

35 What kind of network attack turns a switch into a hub? 2013-05-15T16:51:55.510

34 How do I know if my Linux server has been hacked? 2009-05-01T20:59:12.007

34 What is muieblackcat? 2011-09-08T10:55:24.063

33 How do you avoid network conflict with VPN internal networks? 2009-06-07T06:48:43.903

33 Avoid to keep command in history 2009-08-01T04:53:44.327

33 How bad is setting MySQL's bind-address to 0.0.0.0? 2011-04-08T19:54:48.730

33 Explanation of nodev and nosuid in fstab 2013-10-19T15:45:34.383

33 Is MariaDB a secure replacement for MySQL? 2015-04-20T09:44:01.583

33 Network printer exploited (read: hacked) to print antisemitic documents. How to fix? 2016-03-29T22:45:46.040

32 MITM attacks - how likely are they? 2010-06-20T10:03:04.140

32 Are self-signed SSL certificates secure? 2012-02-25T14:44:38.573

32 Is it best practices to have separate login for a domain for domain admins? 2014-02-12T15:36:28.910

32 Good idea? Refuse incoming emails with our own domain ending? (because they must be fake) 2016-07-05T21:45:27.367

31 Will everyone having Globally Accessible IP's in IPv6 be kind of a security nightmare? 2011-10-27T03:32:04.050

31 What would you do if you realized your email hosting provider could see your passwords? 2013-07-19T01:15:31.453

30 Password best practices 2009-05-07T03:11:19.493

30 Securing PHP webservers 2009-06-06T09:26:24.147

30 Functional implications of differences in SSL and TLS 2009-09-11T13:10:51.400

30 Is a Self Signed SSL Certificate a False Sense of Security? 2011-06-13T06:07:03.153

30 How to enable TLS 1.1 and 1.2 with OpenSSL and Apache 2011-09-23T14:46:35.930

29 Linux hardening - web servers 2009-05-07T18:38:46.830

29 Is it okay to use a SSH key with an empty passphrase? 2010-05-18T13:01:35.450

29 User per virtual host in Nginx 2012-03-18T01:12:02.310

29 Block employee access to public cloud 2014-02-10T12:04:36.790

29 Illegal activities prevention system (child pornography, animal cruelty, …) 2014-06-20T16:40:31.813

29 how to secure an open PostgreSQL port 2014-09-09T06:41:44.290

29 Weird SSH, Server security, I might have been hacked 2017-01-27T01:39:43.460

28 Network Service account accessing a folder share 2009-07-15T16:53:13.940

28 How to do a post-mortem of a server hack 2010-01-28T20:14:29.560

28 Is it safe to reboot a server open to the internet? 2014-07-29T18:09:23.223

27 How do I responsibly dispose of backup tapes? 2009-05-04T06:08:34.430