For 5 Easy Steps to Stay Safe (and Private!) on Facebook click here.
Warning: This is a long, drawn out article. The best solution is – don’t use FaceBook.
a technical and security blog
Security Articles
For 5 Easy Steps to Stay Safe (and Private!) on Facebook click here.
Warning: This is a long, drawn out article. The best solution is – don’t use FaceBook.
Running publically facing DNS servers is often necessary in order to allow Internet resolution of your domains and services but allowing 3rd party look ups of other people’s domains and services (recursion) can create unnecessary server load and potential security problems.
Disabling recursion in BIND is involves editing the BIND configuration file (usually /etc/named.conf) and including the following configuration:
// Version obscures your BIND version information which
// protects you against attackers probing known vulnerabilities.version “[SECURED]â€Â;
// Optional – disables all transfers –
// slaves allowed in zone clausesallow-transfer {â€Ânoneâ€Â;};
// Optional – disable all recursive queries
allow-recursion {â€Ânoneâ€Â;};
recursion no;
Once you have secured your DNS configuration restart BIND (/etc/init.d/named restart) then test that recusion is disabled by clicking here and entering your DNS server/s IP address.
It’s inevitable that at one time, or another, a Linux sys admin will forget or lose a root password for a system they manage or that they’ll inherit a server to which the root passwords are unavailable for.
Thankfully, a Linux servers root password can be reset in a few simple steps via single-user mode.
To enter single-user mode, reboot your computer. If you use the default boot loader, GRUB, you can enter single user mode by performing the following:
passwd root
You can then reboot by typing reboot at the prompt; then you can log in to root as you normally would.
For those using Plesk 9.x, Horde naively allows webmail logins via HTTP (in-secure) or HTTPS (secure). HTTP log-ins are not recommended as username and password information is sent in clear text across the Internet.
In the following example we’ll configure access to http://webmail.yourdomain.com to automatically re-direct to http://webmail.yourdomain.com.
NOTE: These instructions are specific to Plesk’s implementation of Horde but should work on any Horde 3.1.7 installation. Simply locate Horde’s “conf.php” file and adjust the parameters shown below.
[root@youserver /]# nano -w /etc/psa/webmail/horde/horde/conf.php Continue reading “Horde Webmail Security”