the work each day, I would like to make progress with you. Hehe every day progress a little. follow up the other modules, what is the problem please do not mean to point out, together to improve. Welcome everyone and the technical enthusiasts join our QQ Group 262407268, build our "Chinanetcloud Smart city"At present, has completed three relatively small modules: common, service, application in fact, to achieve high performance inside there is a lot of content to learn to accumulate, follow-up
at hand.Log fileStoring the log data in the database seems to look good on the surface, and "Maybe I need to make complex queries about this data in the future", which is popular. This is not a particularly bad practice, but it is very bad if you keep log data and your product data in a database.Perhaps your log records are very conservative, and each Web request produces only one log. For each event of the entire Web site, this still generates a lot of database insertions, competing for the da
loss is not an effective solution. If the application is abnormal result in CPU, memory, IO too high, please locate the abnormal application and repair in time, if the resources are not enough, monitoring should be able to find and rapidly expand
For a large number of systems receiving or transmitting UDP packets, you can reduce the probability of packet loss by adjusting the socket buffer size of the system and program.
When processing UDP packets, the application should be asynchronou
you are responsible for the system you manage. We should fully understand how the system and server software work and regularly check system configurations and security policies. In addition, you should always pay attention to the latest security vulnerabilities and problems posted by the Security site related to the self-managed operating systems and software.
9. Check file integrity
When it is determined that the system has not been intruded, all binary programs and other important system fil
with a dedicated defense against dos attacks. Arbor networks has become a pioneer in this field by virtue of its product peakflow dos. Peakflow deploys a data collection program to analyze the communication traffic (before arriving at the enterprise router or firewall) and search for anomalies. This type of information will be forwarded to the control program, and then the attack will be traced for review. At the same time, the control program sends filtering suggestions to network administrato
Trojan, this method will be ineffective ).
Because the modification of the system kernel is relatively complex (if the kernel has been modified or a kernel-level Trojan, it is more difficult to find out), in/proc, basically, traces of Trojans can also be found. Ideas:
Process ID in/proc, which cannot be viewed (hidden) in ps.
#!/bin/bashstr_pids="`ps -A | awk '{print $1}'`";for i in /proc/[[:digit:]]*;doif echo "$str_pids" | grep -qs `basename "$i"`;then:elseecho "Rootkit's PID: $(basename "$i
Traceroute: network management tool software that can track the path of IP packets entering and leaving the system
Tripwire: system management tool software that can detect whether a specified file has been modified
Ucdsnmp: An SNMP Protocol Application Suite software
Vplay: audio player
Wget: network tool package software that uses HTTP and FTP protocols to download files from the World Wide Web.
Winsd: The Winserver daemon allows Linux to see Windo
requests from the user space after controlling the operating system, without modifying netstat, ps, the binary files of the top and ls programs. Therefore, file system verification tools such as tripwire will be ineffective and cannot guard against the redirection function of knark. If the hacker connects hackme to cat, each time the cat is called, hackme is actually executing. In this way, cat is retained on the system, and the md5 verification code
such file or directory[Root @ apple/] # rm: cannot remove '/sbin/portmap': No such file or directory
I found some interesting things. The attacker cleans up the object through generic, but the script has an error because the file it is trying to delete does not exist. I think our "friend" must have seen these error messages because she was trying to manually delete these identical files even if they didn't exist.
Rm: cannot remove '/tmp/H': No such file or directoryRm: cannot remove '/usr/sbin/
The best Linux security tool-general Linux technology-Linux technology and application information. See the following for details. As a Linux administrator, it is very important to defend against viruses, spyware, and rootkit.
The following lists 10 Linux security tools.
Nmap Security groupsRead the installation documentation.
Experience
Pdf
Nessus Vulnerability failed
Read scan report example
Read
Technical Guide
Read basic knowledge
Clam AntiVirus
Installation help
Vi
= djksdfnvn CURRENT_ADORE = 54
Leakage:If the other side uses tripwire (RHEL4 installed by default), then the replacement of the ehci-hcd.ko is very easy to expose, but there is no way, even if the relink module will be exposed, huh, huh
Question:1. Hidden ports (adore-ng.h) go decimal, I. e. '000000' hides everythingWhichBelongs to port2222.In this case, I understand that the processes related to port 2222 are hidden at the same time. Oh, maybe I ha
software to monitor the TCP service on the internal host regularly.Buffer overflowOverview: Because programmers in many service programs use a function like strcpy (), strcat () that does not perform a valid bit check, it can eventually lead to a malicious user writing a small piece of the program to further open the security gap and then prefix the code at the end of the buffer payload. This way, when a buffer overflow occurs, the return pointer points to the malicious code so that control of
AIDE (Advanced intrusion Detection Environment) is a program for checking the integrity of files and directories and is developed as a substitute for tripwire.How aide WorksThis tool is not too young, Tripwire said, it is easier to operate than the same tool. It needs to take a snapshot of the system, record the hash value, the modification time, and the administrator's preprocessing of the file. This snapshot allows the administrator to set up a data
network intrusion can only be passively prevented. Do we need to monitor our website 24 hours a day !!
8. Our original server security treasure was not optimized for us...
What should I do !!!!!!!!!!
1. On the cdn node (if the cdn is not secure, you can directly modify the cache in cnd !! Our website is not lying down and shot.) The original server opened the advanced security defense system grsecurity and added the pax anti-overflow reinforcement patch. The paxctl-PEMXSR was used to reinfor
must sacrifice a certain degree of ease of use:
The above rules will prevent the active TCP selection from the inside out.
In addition, it is common to use tftp or other clients to obtain files in reverse direction. Because mfv and tools such as loki depend on UDP, We need to completely erase it:
Note:These two rules need to be removed temporarily when updating the system and debugging the network.
Because the essence of intrusion is to get the shell of the target operatin
the file not only verifies the integrity of the file, but also determines whether to accept the file based on the degree of trust they trust the certificate issuer and the certificate owner. The browser is downloading and running plug-ins and small JavaProgramThis mode is used.
The second is to store the digital fingerprints of the binary file system to detect whether the file system has been modified without permission. Many System Management/system security software provide the File System
. This tool can automatically filter emails received in the inbox. Finally, install Clam Anti-virus. This free anti-virus tool integrates Sendmail and spamassassin, and supports email attachment scanning.
Install an intrusion detection system
Intrusion Detection System (IDS) is an early warning system that helps you understand network changes. They can accurately identify (and confirm) attempts to intrude into the system at the cost of increasing resource consumption and error clues. You can try
systems do not automatically install the syslog service required by logwatch (because systemd will exist in their own logs), so you need to install and enable rsyslog, make sure that your/var/log is not empty before using logwatch.
Rkhunter and IDS
Installing Rkhunter and an IDS (such as aide or tripwire) doesn't matter much unless you really understand how they work and configure them correctly (for example: the database is separated from external m
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.