Security

>Security

How To Setup Let’s Encrypt SSL Certificates For An Azure Web App

Everything seems to be moving to "the cloud" these days, and you have a few options such as Microsoft Azure and Amazon AWS to name a few. Depending on your needs, these cloud services can offer a huge number of services ranging from basic web applications all the way to a complete IT infrastructure setup. [...]

By |2018-09-05T13:39:29+00:00September 5th, 2018|Categories: Internet, Server Hardening, Tech Tips|Tags: , , , |0 Comments

How To Upgrade NGINX To Latest Stable Version On Ubuntu

If you followed my previous guides for LEMP Install NGINX PHP7 MySQL on Ubuntu 16.04 Server then you probably installed NGINX from the Ubuntu repo. Unfortunately, the version in the Ubuntu repo doesn't get updated very often, so depending on how long ago you installed NGINX, you might be pretty far behind in versions. Newer [...]

By |2018-04-17T15:05:06+00:00April 17th, 2018|Categories: Linux, Server Hardening, System Administration|Tags: , , , , |0 Comments

Fix SQL Cluster Encryption Error TDSSNIClient initialization failed with error 0xd, status code 0x38

For general instructions on how to Force Encryption on a SQL Server Instance, follow Microsoft KB Artcile How to enable SSL encryption for an instance of SQL Server by using Microsoft Management Console. This article also explains how to enable encryption on a SQL cluster. While trying to Force Encryption on a SQL cluster after [...]

NMap NSE Script To Detect #WannaCry And #Petya MS17-010 SMBv1 Vulnerability

With the recent spread of the #WannaCry (Update 6/27/17: and #Petya) ransomware over the past week, the IT community has been in a frenzy to patch vulnerable systems that are missing the MS17-010 patch that Microsoft released back in March 2017. If you need to scan your network for possible vulnerable systems, you can use [...]

How To Disable NetBIOS on MacOS OS X

Even though my network has NetBIOS disabled in my Windows environment, including on the Windows DHCP server, the Mac OS X computers on the network still want to send NetBIOS requests. While monitoring network traffic using tools like Responder in Kali Linux or Wireshark, you can see the NetBIOS requests being sent. In my case, [...]

By |2017-02-16T15:10:13+00:00February 16th, 2017|Categories: Mac, Security, System Administration|Tags: , , , , , , |2 Comments

How To Harden MongoDB Server

MongoDB is "a document database that provides high performance, high availability, and easy scalability". In this chapter of our InfoSec System Hardening series, we'll walk you through some of the steps you can take to harden your MongoDB database server. You can refer to the MongoDB Server Documentation for more details about the commands and [...]

How To Harden An NGINX Web Server

The next segment in our InfoSec System Hardening series is how to harden an NGINX Web Server. NGINX is an alternative to the popular Apache Web Server on Linux. In this article, we'll show you some of the basics you'll want to take to secure your NGINX Web Server. To get started, you can follow [...]

How To Harden A MySQL Server

As with any server, whether it be a web server, file server, database server, etc, hardening is an important step in information security and protecting the data on your systems. This guide will show you some basics when it comes to hardening a MySQL Server. Most of these changes are simple lines to add into [...]

By |2017-01-16T15:38:43+00:00January 15th, 2017|Categories: Security, Server Hardening, System Administration|Tags: , , , , , |0 Comments

Adobe’s Latest Security Patch Installs Chrome Extension to Collect Data

Earlier this week, Adobe released some updates to fix security issues and vulnerabilities identified in Adobe Acrobat Reader. Twitter's @SwiftOnSecurity noticed a new Google Chrome extension for Adobe Acrobat after the update. According to the post, there is no mention of the new extension anywhere in Adobe's changelog and instead is installed without your knowing. [...]

By |2017-01-13T23:21:03+00:00January 13th, 2017|Categories: Security|Tags: , , , , , |4 Comments

CVE-2016-8655 Five-Year-Old Linux Kernel Local Privilege-Escalation Vulnerability Discovered

A five-year-old serious privilege-escalation vulnerability has been discovered in the Linux kernel that affects almost every distro of the Linux operating system, including Red Hat and Ubuntu. Back in October, a nine-year-old privilege-escalation vulnerability, dubbed Dirty COW was discovered in the Linux kernel that affected every distro of the open-source operating system, including Red Hat, [...]

By |2016-12-07T12:00:38+00:00December 7th, 2016|Categories: Linux, Security|Tags: , , , , , , |0 Comments
Load More Posts