You Are Here: Home » Hacking
FRM – 92095: Oracle JInitiator version too low. Please install version 1.1.8.2 or higher

FRM – 92095: Oracle JInitiator version too low. Please install version 1.1.8.2 or higher

Jika anda menggunakan MAC OS X, apakah anda pernah mendapatkan pesan error pada saat ingin mengakses sebuah web berbasis Java? Pesannya adalah sebagai berikut : "FRM - 92095: Oracl ...

smart city pariaman kota

smart city pariaman kota

smart city pariama  kota ...

Link backbone Mentawai

Link backbone Mentawai

untuk optimalisasi trafik ke mentawai telkom meningkatkan layanannya dengan mengupgrade bacbone dari vsat scpc ke RADIO CERAGON. Hop radio dari bukittinggi ke mentawai ME-D1-BKTA-- ...

Mini ring unand  using omni switch and L3 HP dengan metro satu metro dengan 2 port beda

Mini ring unand using omni switch and L3 HP dengan metro satu metro dengan 2 port beda

ini di karenakan link nya menjadi prioritas karena kampus ini makai bw nya cuku gede. yah alih2 ini untuk meminimalkan ggnnya. yah supaya pelanggan puas. bikin 2 homing transport : ...

Osi Layer and TCPIP

Osi Layer and TCPIP

      Switching concept   ...

Security: 10 Tips for Hardening a Linux Server

In light of all the complex and specialized attacks on Internet-facing servers, it’s very important to protect your cloud assets from malicious assailants whose sole purpose is to leach, alter, expose, siphon sensitive data, or even to shut you down. From someone who does a lot of Linux deployments, I like to have handy a Linux template with some extra security policies configured. Securing your environment ...

Read more

Linux Iptables allow or block ICMP ping request

The Internet Control Message Protocol (ICMP) has many messages that are identified by a "type" field. You need to use 0 and 8 ICMP code types. => Zero (0) is for echo-reply => Eight (8) is for echo-request. To enable ICMP ping incoming client request use following iptables rule (you need to add following rules to script). My default firewall policy is blocking everything. Task: Enable or allow ICMP pi ...

Read more

How to: Linux Iptables block common attacks

Following list summaries the common attack on any type of Linux computer: Syn-flood protection In this attack system is floods with a series of SYN packets. Each packets causes system to issue a SYN-ACK responses. Then system waits for ACK that follows the SYN+ACK (3 way handshake). Since attack never sends back ACK again entire system resources get fulled aka backlog queue. Once the queue is full system wi ...

Read more

Linux: 20 Iptables Examples For New SysAdmins

Linux comes with a host based firewall called Netfilter. According to the official project site: netfilter is a set of hooks inside the Linux kernel that allows kernel modules to register callback functions with the network stack. A registered callback function is then called back for every packet that traverses the respective hook within the network stack. This Linux based firewall is controlled by the pro ...

Read more

Debian / Ubuntu Linux Install Advanced Intrusion Detection Environment (AIDE) Software

AIDE is an open source host-based intrusion detection system which is a replacement for the well-known Tripwire integrity checker. It provide software integrity checking and it can detect that intrusions (monitor filesystem for unauthorized change such as find out if system binaries modified and a new cracked versions installed or not) have occurred on the system. How do I install and configure AIDE under U ...

Read more

psad: Linux Detect And Block Port Scan Attacks In Real Time

Q. How do I detect port scan attacks by analyzing Debian Linux firewall log files and block port scans in real time? How do I detect suspicious network traffic under Linux? A. A port scanner (such as nmap) is a piece of software designed to search a network host for open ports. Cracker can use nmap to scan your network before starting attack. You can always see scan patterns by visiting /var/log/messages. B ...

Read more

Linux Iptables Avoid IP Spoofing And Bad Addresses Attacks

Spoofing and bad address attack tries to fool the server and try to claim that packets had come from local address/network. Following IP/netwok address are know to open this kind of attack: Incoming source IP address is your servers IP address Bad incoming address from following ranges: 0.0.0.0/8 127.0.0.0/8 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 192.168.0.0/16 224.0.0.0/3 Your own internal server/network ...

Read more

CentOS / Redhat Iptables Firewall Configuration Tutorial

How do I configure a host-based firewall called Netfilter (iptables) under CentOS / RHEL / Fedora / Redhat Enterprise Linux? Netfilter is a host-based firewall for Linux operating systems. It is included as part of the Linux distribution and it is activated by default. This firewall is controlled by the program called iptables. Netfilter filtering take place at the kernel level, before a program can even pr ...

Read more

25 Hardening Security Tips for Linux Servers

Everybody says that Linux is secure by default and agreed to some extend (It’s debatable topics). However, Linux has in-built security model in place by default. Need to tune it up and customize as per your need which may help to make more secure system. Linux is harder to manage but offers more flexibility and configuration options. Securing a system in a production from the hands of hackers and crackers i ...

Read more

© 2011 Powered By Wordpress, Goodnews Theme By Geeks Docuementation

Scroll to top