Apache Security

Apache Security

Ivan Ristic

Language: English

Pages: 432

ISBN: 0596007248

Format: PDF / Kindle (mobi) / ePub


Note: This book is now out of print. FREE digital version (PDF, EPUB, Kindle, Online) is available from the author on feistyduck.com.

With more than 67% of web servers running Apache, it is by far the most widely used web server platform in the world. Apache has evolved into a powerful system that easily rivals other HTTP servers in terms of functionality, efficiency, and speed. Despite these impressive capabilities, though, Apache is only a beneficial tool if it's a secure one.

To be sure, administrators installing and configuring Apache still need a sure-fire way to secure it-whether it's running a huge e-commerce operation, corporate intranet, or just a small hobby site.

Our new guide, Apache Security, gives administrators and webmasters just what they crave-a comprehensive security source for Apache. Successfully combining Apache administration and web security topics, Apache Security speaks to nearly everyone in the field. What's more, it offers a concise introduction to the theory of securing Apache, as well as a broad perspective on server security in general.

But this book isn't just about theory. The real strength of Apache Security lies in its wealth of interesting and practical advice, with many real-life examples and solutions. Administrators and programmers will learn how to:

  • install and configure Apache
  • prevent denial of service (DoS) and other attacks
  • securely share servers
  • control logging and monitoring
  • secure custom-written web applications
  • conduct a web security assessment
  • use mod_security and other security-related modules

And that's just the tip of the iceberg, as mainstream Apache users will also gain valuable information on PHP and SSL/ TLS. Clearly, Apache Security is packed and to the point, with plenty of details for locking down this extremely popular and versatile web server.

The Book of Xen: A Practical Guide for the System Administrator

Learning MySQL

Beyond Artificial Intelligence: The Disappearing Human-Machine Divide (Topics in Intelligent Engineering and Informatics, Volume 9)

WebUser [UK], Issue 389 (27 January - 9 February 2016)

On Computing: The Fourth Great Scientific Domain

Beginning ASP.NET 4.5: in C# and VB

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Multiple DMZs allow different classes of users to access the system via different means. To participate in high-risk systems, partners may be required to access the network via a virtual private network (VPN). To continue to refine the network design, there are four paths from here: Network hardening General network-hardening elements can be introduced into the network to make it more secure. They include things such as dedicated firewalls, a central logging server, intrusion detection

Sometimes workstations are configured to retrieve an unused IP address from a pool of addresses at boot time, usually using a DHCP server. If users turn off their computers daily, their IP addresses can (in theory) be different each day. Thus, an IP address used by one workstation one day can be assigned to a different workstation the next day. Some workstations are not allowed to access web content directly and instead must do so through a web proxy (typically as a matter of corporate

of the client, when available. REMOTE_USER Authenticated username, when available. REMOTE_IDENT Remote username (provided by the identd daemon but almost no one uses it any more). REQUEST_METHOD Request method (e.g., GET, POST). SCRIPT_FILENAME Full system path for the script being executed. PATH_INFO The extra part of the URI given after the script name. For example, if the URI is /view.php/5, the value of PATH_INFO is /5. QUERY_STRING The part of the URI after the

of file disclosure attacks Command execution and file disclosure attacks are often easier to detect in the output. On my system, the first line of /etc/passwd contains "root:x:0:0:root:/root:/bin/bash," and this is the file any attacker is likely to examine. A pattern such as root:x:0:0:root is likely to work here. Similarly, the output of the id command looks like this: uid=506(ivanr) gid=506(ivanr) groups=506(ivanr) A pattern such as uid=[[:digit:]]+\([[:alnum:]]+\)

Service Attacks defense strategy, DoS Defense Strategy local, Local Attacks, PAM Limits, Process Accounting, Kernel Auditing kernel auditing, Kernel Auditing PAM limits, PAM Limits process accounting, Process Accounting network attacks, Network Attacks, Malformed Traffic, Brute-Force Attacks, SYN Flood Attacks, SYN Flood Attacks, Source Address Spoofing, Source Address Spoofing, Distributed Denial of Service Attacks, Distributed Denial of Service Attacks, Reflection DoS Attacks

Download sample

Download