Articles tagged with security

  1. OpenSSH: Using a Bastion Host

    Posted on in System Administration

    Quick and dirty OpenSSH configlet here. If you have a set of hosts or devices that require you to first jump through a bastion host, the following will allow you to run a single ssh command:

    Host *
        ProxyCommand ssh -A <bastion_host> nc %h %p
    

    Change the Host * line to best …

  2. [Cisco] Telnet/SSH work, HTTP Gives Permission Denied

    Posted on in Networking

    Here are a few tips that might be helpful if you are having trouble accessing your Cisco router or switch via the web server.

    • Make sure you have the right password! This is pretty obvious, but it's definitely the first thing worth checking.
    • If you're using aaa new-model, you will …
  3. Cisco IPS Inline Bypass Mode

    Posted on in Networking

    On occasion, you may need to put your Cisco IPS into bypass mode. Bypass mode allows the IPS to pass traffic without inspecting it. This may be useful if you suspect the IPS is causing a problem, if you are going to run a one-time scan that would set the …

  4. Rate-limiting SSH connections with iptables

    Posted on in System Administration

    If you have SSH open toward the Internet, you are surely aware of the number of brute force password attempts your server sees everyday. Although a good password policy may make these attempts nothing more than an annoyance, each connection to your SSH daemon takes up valuable server resources. I …

  5. Getting Started in E-Commerce

    Posted on in Information Systems

    When building an e-commerce presence for an existing bricks and mortar retail business, two issues come to mind as needing immediate attention. The first issue isn't related to the technology of the website, but instead focuses on how the company is run. A typical company makes decisions using the strategic …

  6. Building Security Awareness

    Posted on in Information Systems

    Company X has decided to implement a new security plan. This plan includes changes to the information systems architecture and will impact the day-to-day work activities of many employees. Additionally, many operational procedures will be changed to reflect a more defensive security stance. It is not uncommon for organizations undergoing …

  7. The Benefits of Contingency Planning

    Posted on in Information Systems

    Organizations use contingency planning to ensure the quickest return of information services in the event of a service disruption. A service disruption can be any event that affects the continuity of information services and may range from a human orchestrated denial of service attack to a major earthquake. From a …

  8. Security Breakdowns

    Posted on in Information Systems

    Even a network maintained by the most diligent security professionals will occasionally suffer from a security breakdown. A security breakdown is an incident that results in the opportunity for an information system to be compromised. The breakdown does not have to result in an actual compromise; the opportunity for compromise …

My Bookshelf

Reading Now

Other Stuff