Questions tagged [security]

For questions relating to application security and attacks against software. Please don't use this tag alone, that results in ambiguity. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. If your question is not about a specific programming problem, please consider instead asking it at Information Security SE

Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

Resources

6881 questions
3
votes
4 answers

Am I at risk by leaving a test FTP account available on the server?

I have two Filezilla server instances on different WAN connections, both mapping to the same /test directory on the file server. To validate that clients have connectivity I have a read/list only test account (e.g. test) with a simple password that…
Lunatik
  • 133
  • 1
  • 8
3
votes
2 answers

High number connections coming from an IP

On our corporate network we're detecting workstations opening too many connections to the IP address 75.126.196.159 (port 3478) causing the Cisco ASA Firewall 5550 to detect a "SYN Attack" and reach its limit in terms of connections, causing a…
Andre
  • 1,341
  • 4
  • 19
  • 34
3
votes
1 answer

Determine if possible successful probe is successful exploit?

A logwatch report outputted the following message. A total of 1 possible successful probes were detected (the following URLs contain strings that match one or more of a listing of strings that indicate a possible…
devunder
  • 450
  • 5
  • 9
3
votes
1 answer

Mod Security ctl:ruleEngine=Off Whitelist Fails in Phase 1

mod_security with custom rules and whitelists in separate .conf files - Apache 2.2, modsec 2.8 Whitelist rule: SecRule REMOTE_ADDR "^10\.10\.10\.10" phase:1,nolog,allow,ctl:ruleEngine=Off,id:104008 If a request is sent to the server that includes…
Santrix
  • 263
  • 3
  • 10
3
votes
2 answers

Wireless configuration file

Vista now appears to support automatic wireless key distribution through USB disks. To see this in action, attempt to connect to a secure access point (that you don't have a key for) and when it asks for a key, insert a USB drive. It reports that…
Adam Davis
  • 5,446
  • 3
  • 37
  • 52
3
votes
1 answer

PCI Failure due to HTTP Reverse Proxy Detection

We use Security Metrics for our PCI compliance scans. Haven't had any issues in the past but our most recent scan said we failed due to "HTTP Reverse Proxy Detection". I'm guessing this has to do with either static assets or the way heroku routes…
Adam
  • 131
  • 1
  • 3
3
votes
1 answer

How are files being added to site as apache, when site is running as FastCGI?

I have a web server that is running many different sites (standard vhosts setup, most sites are Joomla based, a few wordpress and other non-CMS sites) in a Parallels Automation 11.5 environment. The version of apache on the web server, is 2.2.15,…
cwm33
  • 31
  • 2
3
votes
6 answers

How do we secure our source code?

Our source code is our most prized asset. I would like to have it: secured from proliferation by in-house developers but they also need unrestricted access to the code to do their job right. So I'm not sure this is even possible. regularly backed…
gAMBOOKa
  • 999
  • 6
  • 19
  • 34
3
votes
3 answers

How is a private data center more secure than a public cloud?

I have customers in the financial services industry that insist that a SaaS hosted on public clouds like Amazon's are not as secure as colocation in a private data center. However, I can't find specific details of what those security shortcomings…
projectshave
  • 154
  • 5
3
votes
2 answers

Should a NAT host be separate from a Bastion host

Have a private network with servers that required SSH access. Since the instances are in a private subnet, they cannot be accessed directly via SSH and require a public Bastion host to access. Workstation -> via SSH -> Bastion -> via SSH Forwarding…
csi
  • 1,555
  • 7
  • 23
  • 42
3
votes
1 answer

SCCM 2012 Software Update role - Can I still use WSUS?

I manage a network of about 1200 workstations and about 200 or so servers. We have migrated away from McAfee in favor of System Center Endpoint Protection for our corporate Anti-Malware solution. Currently, the policy is set to update directly…
Wes Sayeed
  • 1,902
  • 6
  • 28
  • 43
3
votes
1 answer

How to authenticate a user from an external Windows Domain (Active Directory)

I have a service (AcmeService) running on a domain (ACME.COM) and a user running in another domain (DISNEY.COM). mickey@disney.com wants to authenticate with the AcmeService. The service knows about the DISNEY.COM domain and it imported all the user…
JeffCyr
  • 139
  • 1
  • 5
3
votes
4 answers

Disable Windows Share Without Administrator Access

We have a folder on a windows server shared to provide access to an important application. When the application is being updated we (DBAs) change the permissions on the share to deny all access to it and then disconnect any files open on the share.…
Leigh Riffel
  • 605
  • 2
  • 10
  • 23
3
votes
1 answer

Do all captive portal solutions work the same way? (cookie, vs MAC address, vs other?)

While traveling and having to interact with a number of broken captive portal implementations I've overheard other passengers having usability issues with iPads, Phones, computers depending on the captive portal technology being used. E.g. Captive…
makerofthings7
  • 8,911
  • 34
  • 121
  • 197
3
votes
3 answers

Domain User can RDP into Domain Controller?

Vanilla Windows Server 2008 x64 Standard DC (AD, DNS). I was remoting into my DC to do a bit of work and, thru force of habit, logged into the server using a regular domain account, not a domain admin. I was shocked to see that I was able to RDP…
1 2 3
99
100