![]() |
![]() ![]() ![]() ![]() |
|
|||||
|
||||||
O'Reilly Open Source Convention: July 26-30, Portland, OR. |
|
![]() |
![]() Security Alerts User-Friendly Form Validation with PHP and CSS Any non-trivial web application processes form data, and every secure web application has to validate that data on the server. Balancing security with user-friendliness can be tricky. Jeff Cogswell demonstrates one approach. [PHP DevCenter] Using Penetration Testing to Identify Management Issues Bob Ayers wrote a thought-provoking foreward for Chris McNab's Network Security Assessment that details network attack and penetration techniques in line with U.K. (CESG CHECK) and U.S. (NSA IAM) government standards. Chris has slightly modified Bob's foreward for the book and presents it here in article form. [ONLamp.com] Security Alerts Cookie Specification Vulnerabilities For years, privacy-minded people have distrusted cookies in web browsers. While recent advances have improved privacy concerns, the specification leaves room for easy attacks. Alexander Prohorenko explains the situation and tests several recent browsers. Is it time for a new cookie specification? [Security DevCenter] Planning for Disaster Recovery on LAMP Systems The beauty of LAMP systems is that you can develop them as formally or informally as you like. Unfortunately, when it comes time to plan for disaster recovery, that informality can work against you. Robert Jones presents several guidelines for development and configuration that can make recovery easier. [ONLamp.com]
Top Ten Tips to Make Attackers Lives Hell Chris McNab breaks down his top ten tips all network administrators should follow to protect their networks from opportunistic threats and make it hard for the more determined attackers to get anywhere. Chris is the author of the recently released Network Security Assessment. [Security DevCenter] Security Alerts Symbiot on the Rules of Engagement Andy Oram talks to the chief officers of Symbiot Security about their controversial white paper, "The Rules of Engagement". [Security DevCenter] Security Alerts The Journey from Poacher to Gamekeeper Chris McNab, author of O'Reilly's upcoming Network Security Assessment, has been on both sides of the hacker fence. In this article, Chris explains how his past led him to trade in his black hat for a white one, and what he hopes to achieve with his new book. [security.oreilly.com] Security Alerts Security Alerts Security Alerts Web App Security Testing with a Custom Proxy Server Assuming users will only access your web applications as you intend may be the best way to invite abuse. Attackers have tools to build bogus responses, so why not use the same techniques to toughen your own sites? Nitesh Dhanjani demonstrates how a custom proxy server can help you test the security of your web apps. [ONLamp.com] Introducing mod_security Every layer of security you can add is one more deterrent for the bad guys. Writing (or choosing) secure code is important, but it's not the only defense. Ivan Ristic, creator of mod_security, explains how this Apache module can turn back potential attacks before they reach your code. [Apache DevCenter] Distributed Computing Sanity Checking Distributed computing can be a little scary. Clients are running code on their computers and servers are trusting clients to send back valid data. However you're participating, how can you be secure? Howard Feldman suggests several techniques to evaluate the trustworthiness of a distributed computing project. [ONLamp.com] Single Sign-on for Your Web Applications with Apache and Kerberos In this article, Jason Garman, author of Kerberos: The Definitive Guide, walks you through the implementation of SPNEGO, which allows for single sign-on of your web applications with Apache and Kerberos. Once you've performed these steps, clients who access the protected area of your Apache web server will transparently pass their domain credentials to your web server, with no separate username or password prompts. [ONLamp.com] PHP Foundations Security Alerts Inside Prelude, an Open Source IDS Keeping the bad guys out is important. Knowing whether, not if, they're in is even more important. Prelude, an open source IDS, takes a hybrid approach to security, collecting information from various sensors. KIVILCIM Hindistan talks to Yoann Vandoorselaere, Prelude's lead developer. [ONLamp.com] FreeBSD Basics Security Alerts Security Alerts Security Alerts Security Alerts FreeBSD Jails A common security breach involves exploiting one application to gain access to another. Keeping separate applications separate can limit the potential damage. Mike DeGraw-Bertsch explains how FreeBSD's jails can help secure necessary applications. [BSD DevCenter] PHP Foundations PHP Foundations Securing Small Networks with OpenBSD Ten Security Checks for PHP, Part 2 The same global access that makes web apps useful means that you have to keep on top of security. Though it's easy to create sites in PHP, it's not immune to sloppy coding. Clancy Malcolm explains how to recognize and fix five potential security holes with PHP in the second of two articles. [PHP DevCenter] Ten Security Checks for PHP, Part 1 The same global access that makes web apps useful means that you have to keep on top of security. Though it's easy to create sites in PHP, it's not immune to sloppy coding. Clancy Malcolm explains how to recognize and fix five potential security holes with PHP in the first of two articles. [PHP DevCenter] ![]() |
![]() |
![]() |
![]() |
![]()
|
![]() |
![]() Sponsored by: ![]() ![]() |
![]() |
||||||||
Contact Us | Advertise with Us | Privacy Policy | Press Center | Jobs Copyright © 2000-2004 O’Reilly Media, Inc. All Rights Reserved. |