Blogspot - vnsecure.blogspot.com - Welcome To Vnsecure's Blog!

Latest News:

Securing Apache Step-by-Step 27 Jan 2008 | 05:42 pm

Securing Apache: Step-by-Step Artur Maj This article shows in a step-by-step fashion, how to install and configure the Apache 1.3.x Web server in order to mitigate or avoid successful break-in when n...

Securing PHP: Step-by-Step 27 Jan 2008 | 05:41 pm

In my previous article ("Securing Apache: Step-by-Step") I described the method of securing the Apache web server against unauthorized access from the Internet. Thanks to the described method it was p...

Apache 2 with SSLTLS Step-by-Step Part 1 27 Jan 2008 | 05:41 pm

For more than 10 years the SSL protocol has been widely used for the purpose of securing web transactions over the Internet. One can only guess how many millions or billions of dollars in transactions...

Apache 2 with SSLTLS Step-by-StepPart 3 27 Jan 2008 | 05:41 pm

Introducing part three This article concludes our three part series dedicated to configuring Apache 2.0 with SSL/TLS support -- for maximum security and optimal performance of SSL based e-commerce tra...

Apache 2 with SSLTLS Step-by-Step Part 2 27 Jan 2008 | 05:41 pm

In the first article of this three part series, the reader was shown how to install, configure, and troubleshoot Apache 2.0 with SSL/TLS support. Part two now discusses the recommended settings for th...

Securing Apache 2 Step-by-Step 27 Jan 2008 | 05:40 pm

When choosing a web server, Apache very often wins against its competitors because of stability, performance, that fact that it's open source, and many other advantages. But when deciding on which ver...

Secure MySQL Database Design 27 Jan 2008 | 05:34 pm

When it comes to installing software, secure design is often the last consideration. The first goal is usually just to get it to work. This is particularly true of databases. Databases are commonly re...

Phpsec Overview 27 Jan 2008 | 02:46 pm

1. Overview 1.1 What Is Security? 1.2 Basic Steps 1.3 Register Globals 1.4 Data Filtering 1.4.1 The Dispatch Method 1.4.2 The Include Method 1.4.3 Filtering Examples 1.4.4 Naming Conventions ...

Remote Desktop Management Solution for Microsoft 27 Jan 2008 | 02:44 pm

One of the many challenges facing Microsoft administrators is how to manage remote systems in a secure manner? In the world of the UNIX the answer is quite simple: using the SSH protocol is sufficient...

Phpsec Form Processing 27 Jan 2008 | 02:40 pm

2.1 Spoofed Form Submissions 2.2 Spoofed HTTP Requests 2.3 Cross-Site Scripting 2.4 Cross-Site Request Forgeries Spoofed Form Submissions In order to appreciate the necessity of data filtering, c...

Related Keywords:

xlator expired cert, xlator expired certif

Recently parsed news:

Recent searches: