PHP Security ramble on Apache server security settings
1, to nobody users to run
In general, Apache is installed and run by root. If the Apache server process has root user privileges, it poses a significant threat to the security of the system and should ensure that the Apache server process runs with the most likely low-privileged users. By modifying the follo
3 Demonstration Verification scheme and result analysis3.1 Demonstration Validation Scenarios3.1.1 Verifying targetsThis scheme is mainly used to verify the system protection process and the corresponding protection principle of selinux implemented by flask architecture.3.1.2 Verifying the environmentOperating system: centos6.3 with SELinux enabledKernel version: 2.6.32-279.e16.i686Policy type: TargetedPolicy version: policy.24Necessary packages: Setools, Policycoreutil3.1.3 Technical principleB
Talking about security, such as now on the market some OAuth2 \ Oidc-openid Connect, identity authentication, authorization, and so on, the following first Java SecurityThis piece of stuff is a lot more complicated than spring Security or. Netcore Security, 1.1-point comparison noteSpring SecurityPart:Securitycontextholder provides several ways to access the Secu
Article 3: Other articles can be found on this site
We have discussed several "three major vulnerability exploitation tools to help you" and "four major protection methods" to help you make Rootkit difficult to escape from the "legal" network. let's take a look at ten tools that can help us review network security today.
I. Nessus: This is a UNIX platform vulnerability assessment tool. It can be said that it is the best and free web vulnerability scan
interface Loginmodule.
The method of implementing interface Loginmodule.
1.2 Configuring the provider for the Jaas login moduleThe Jaas login module is configured in the properties file java_home/jre/lib/security/java.security . To configure the jars login module in the J2SE environment,To apply the provisioned Jaas login moduleYou can use the jars configuration file (such as my-jaas.conf) to configure the Jaas login module for your app. The
file but does not run commands on the local host. The default value is off.
Mail_no_user
If the user whose user name is not in the sudoers file runs sudo, send an email to the mailto user. The default value is on.
Mailsub = subj
(Mail subject) change the default Email subject used for warning and error messages from the default *** SECURITY information for % h *** to subj. The sudo utility extends % h to the Host Name of the local system in subj. I
depends on your network environment. In general, if your server uses a real IP address (the address is usually allocated to you by the IDC), the firewall's transparent mode will be selected. In this mode, your server looks like you are directly facing the internet, and all access requests to the server are directly sent to the server. Of course, packets will pass the firewall detection before they arrive at the server, and packets that do not comply with the rules will be discarded (from the pe
This article was intended to be written since very early last year and has never been available. It was just a short time when a salon talked about such things.In the past, security enthusiasts often studied local app security, such as remote control, application cracking, and information theft,Most people have not noticed the security issues on the app server, s
Rule 1: Never trust external data or input
The first thing you must realize about WEB application security is that you should not trust external data. External data (outside) includes any data that is not directly entered by the programmer in the PHP code. Any data from any other source (such as GET variables, form POST, database, configuration files, session variables, or cookies) is untrusted until measures are taken to ensure
Cookie information security: cookie information security. Cookie information security for user login: cookie information security everyone knows that after a user logs on, the user information is generally stored in the cookie, because the cookie is saved on the client, cookie information
In an insecure NIS instance, The ypcat passwd command can be used on any machine to view the hash values of all NIS accounts. This poses a security risk. After C2 Security is set, ypcat passwd can see that the original hash value of the password is replaced by # logname, which can prevent the password hash from being stolen. You only need to perform a few steps to set C2
System Security
Minimum Service Method
File Security (SUID/SGID/stick/chattr)
Upgrade system and software
Least permission method (SU/SUDO)
SSH Security suggestions
Min service method (System V/xinetd)
Disable unnecessary services:
# Vim/root/service. Sh
#! /Bin/bash
Service xinetd stop
Chkconfig xinetd off
Services = "Network sshd syslogs lvm2-monitor messag
When you do not need to use a secure folder, you can uninstall it, and the contents and applications will be deleted, as follows:
1. On the main screen, click "Settings".
2. Click "Lock screen and security".
3. Click on "Security Folder".
4. Click "Uninstall".
5. If you choose Uninstall at this time, all applications in the Securi
Third, System port security Configuration
Here is a brief introduction to some of the basics of ports, mainly to facilitate our next security configuration to lay the groundwork, if
You have a deeper understanding of the port and you can skip this step.
The port is the logical interface between the computer and the external network, and the first barrier of the computer, the port configuration is correct or
While most it people know about virtual desktops and know they can be used in data centers, a useful use of this technique is often overlooked. Desktop virtualization is now very lightweight, and employees can connect remotely to the applications they need, while at the same time better secure their devices.
I recently talked to an Atlanta financial company who used the security technology of Ringcube Technologies company Virtual desktops and the Saf
Delete the following registry primary key:
Wscript.Shell
Wscript.shell.1
Shell.Application
Shell.application.1
Wscript.Network
Wscript.network.1
regsvr32/u wshom.ocx carriage return, regsvr32/u wshext.dll carriage return
Windows 2003 hard Drive security settings
C:\
Administrators All
System All
IIS_WPG only This folder
List Folder/Read data
Read properties
Read Extended Properties
Read permissions
C:\inetpub\mailroot
Administrators All
System All
Se
Command:Vim/etc/login.defsDefault settings:# Password Aging controls:## Pass_max_days Maximum Number of days a password is used.# pass_min_days Minimum number of days allowed bet Ween password changes.# pass_min_len Minimum acceptable password length.# pass_warn_age number of Days warning given before a password expires. #PASS_MAX_DAYS 99999pass_min_days 0 Pass_min_len 5 pass_warn_age 7Analytical:Pass_max_days---Password valid days, maximum how long to change
Original address: Webapi using token+ signature verification
first, not to verify the way
API Query Interface:
Client invocation: http://api.XXX.com/getproduct?id=value1
As above, this way is simple and rough, in the browser directly input "Http://api." Xxx.com/getproduct?id=value1 ", you can get product list information, but this way there will be a very serious security problems, without any verification, you can get to the product list, resulti
Step One: Open the Conf folder under the ACTIVEMQ installation directory, open the Conf/jetty.xml,
Value value = "false" for property name authenticate, modified to value = "true". The implication is: Launch login security authentication mechanism
Step Two: Configure ACTIVEMQ secure login account and password
Control ACTIVEMQ Security login account and password information is in the Conf/jetty-real.proper
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.