PHP DSO DSO – Dynamically Shared Objects Apache with PHP can be installed in two different ways. Statically embed the PHP binary into the Apache binary. This is probably the fastest and best way to run PHP Install Apache and PHP is by using Apaches DSO module Why DSO? Apache supports adding modules on instead of embedding them in the httpd binary. This works well when you dont want to re-compile Apache each time a module is updated, or if you want to add on numerous modules for development purposes …
Server Security
Mod_Security 2.5 Need for a Webserver Security Module It is pretty difficult to secure application softwares. Common targets are Open Source software like PHPNuke. An attacker can easily find out vulnerabilities in the code. If your application is vulnerable to SQL injection, invoking the URL above may very well delete all user data from your application. You can use mod_rewrite to avoid this attack. it is very easy to detect the words drop and table, and then redirect the client away from the original URL. A determined attacker could simply …
suPHP suPHP is a tool for executing PHP scripts with the permissions of their owners. It consists of an Apache module (mod_suphp) and a setuid root binary (suphp) that is called by the Apache module to change the uid of the process executing the PHP interpreter. Main Features of SuPHP suPHP provides an additional layer of protection on servers. It causes php scripts to run under the account username instead of the user nobody which is the user that apache/php would run under on a server that is not running …
SSH Securing What is SSH.. ? Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for Telnet and other insecure remote shells, which send information, notably passwords, in plaintext, leaving them open for interception. The encryption used by SSH provides confidentiality and integrity of data over an insecure network, such as the Internet. SSH uses public-key cryptography to …
IPTABLES Introduction The Internet Protocol (IP) is a data-oriented protocol that allows multiple hosts to talk to each other across network connections. Data in an IP network are sent in blocks referred to as packets or datagrams. They typically have a source host, destination host, and source and destination ports associated with the communication. Layered on top of the IP protocol are other protocols. These are typically transport layers. There are two main transport protocols that are heavily used. The transmission control protocol (TCP) is a stateful delivery mechanism that …