Security – Internetblog.org.uk https://www.internetblog.org.uk Web hosting, Domain names, Dedicated servers Fri, 29 Jan 2016 11:05:52 +0000 en-US hourly 1 https://wordpress.org/?v=4.9.5 https://www.internetblog.org.uk/files/2016/01/cropped-favico-32x32.png Security – Internetblog.org.uk https://www.internetblog.org.uk 32 32 Colocation sever security https://www.internetblog.org.uk/post/1844/colocation-sever-security/ https://www.internetblog.org.uk/post/1844/colocation-sever-security/#respond Fri, 21 Jun 2013 13:17:42 +0000 https://www.internetblog.org.uk/?p=1844 physical-serversCollocation is the movement of the servers from an in house location usually to a much safer location that is marked with specialized environment for the servers. Collocation sites usually offer the users with an environment that features high-security features such as cameras, fire detection and extinguishing devices. Some of them also provide multiple connection feeds, filtered power and backup power generators as well as other items in order to ensure there is high-availability. This is in essence a mandatory requirement for all Web-based, virtual businesses.

What are the benefits of collocation?

The first benefit that you come across when the servers have been collocated is the fact that the data a company has is stored safely away from prying hackers and other unauthorized access. In addition, you are able to get more hits on the website without paying for the bandwidth. This in essence means that you get more bandwidth for free. The fact that the collocation provider takes over the management of the server means that you are able to better concentrate on the core part of your business. Add this to the fact that you will now be able to share the bandwidth with the server collocation provider. Speaking from a purely business perspective, this one of the fastest ways to cut the operational costs of having a server in your location. You will also set yourself aside from threats to the servers such as power outages and break ins, which pose security risks to the data you have.

]]>
https://www.internetblog.org.uk/post/1844/colocation-sever-security/feed/ 0
Important Features of Secure Web Hosting https://www.internetblog.org.uk/post/1755/important-features-of-secure-web-hosting/ https://www.internetblog.org.uk/post/1755/important-features-of-secure-web-hosting/#respond Thu, 24 Jan 2013 16:30:29 +0000 https://www.internetblog.org.uk/?p=1755 Web hosting security  security is perhaps the greatest concern of providers and users alike. Hackers and malicious entities pervade the internet, putting valuable information at risk. Secure web hosting is particularly important for sites that facilitate transactions (i.e. online shops) and sites that transmit and receive massive amounts of sensitive data.

 Why Security’s Very Important

Your website is a crucial part of your business. It’s created to support customer relations and company objectives. Secure web hosting warrants that your site keeps doing what it’s intended to do. The difficult (almost unthinkable) reality is that once your web hosting server has been attacked, your business reputation can be seriously tarnished. Security attacks can result to loss of huge amounts of money; decreased customer trust; proliferation of wrong information about your business; and partial or complete damage of your web platform.

The internet is truly an amazing tool of convenience and web hosting services make this tool more accessible to potential markets. Unfortunately, the web also provides opportunities for terrible acts. Web hosting security is not something you should take lightly, especially now that cyber felons and criminals operate in more cunning and wily ways.

Web Hosting Security Features to Look Out For

When considering options from the vast sea of web hosting providers, take into account the completeness of the package they are offering. First, make sure that they include daily malware detection in their services. Malware (thousands of which are spreading on the internet) can come in form of scripts, viruses, worms and just about anything that comprises your site’s integrity. It is imperative that the web hosting service that you choose is keen on consistently protecting you from any kind of software that can disrupt your computer systems.

Secondly, your web hosting provider should have accessible and regular backup schemes that are free of charge or that come at a reasonable cost. Daily, weekly or monthly backups help ensure that in the event your system is compromised or when natural disasters occur, you’ll have a way to retrieve your information. Most web hosting providers ask you to pay extra for this service because it requires the use of secure, off-site data centers.

Thirdly, your web hosting package must include reliable encryption methods and access management. Encryption keeps your data safe during transit amidst prying and suspicious eyes. Access management is essential in web hosting because it keeps unauthorized individuals from gaining control of your entire site.

]]>
https://www.internetblog.org.uk/post/1755/important-features-of-secure-web-hosting/feed/ 0
ICANN adds terrorism background checks https://www.internetblog.org.uk/post/1586/icann-adds-terrorism-background-checks/ Thu, 29 Jul 2010 21:37:34 +0000 http://www.internetblog.org.uk/?p=1586 no terrorism
Never failing to draw criticism, ICANN has included a controversial new step to the gTLD application process: a terrorism background check. The new policy is listed in the latest edition of the gTLD handbook under “Section 1.2.1 Eligibility and 2.1 Background Check.”

Background checks at both the entity level and the individual level will be conducted for all applications, to confirm eligibility. The background check may include, but is not limited to any of the following areas:
• Corruption and bribery
• Terrorism
• Serious and organized crime
• Money laundering
• Corporate fraud and financial regulatory breaches
• Arms trafficking and war crimes
• Intellectual property violations

This has caused quite an upset in the Middle East, where some are afraid background checks by the American-run ICANN could turn into racial profiling. Either way, something tells me that terrorist groups would much rather invest $100,000 in missiles instead of the gTLD application fee.

]]>
ICANN hands out keys to global cyber guardians https://www.internetblog.org.uk/post/1583/icann-hands-out-keys-to-global-cyber-guardians/ Wed, 28 Jul 2010 20:56:34 +0000 http://www.internetblog.org.uk/post/1583/icann-hands-out-keys-to-global-cyber-guardians/ As a part of a security measure to save the Internet from complete and utter destruction in the event of a Dooms Day scenario, ICANN has handed out seven “guardian keys” to secret individuals from the following countries: Britain, the U.S., Burkina Faso, Trinidad and Tobago, Canada, China and the Czech Republic.

In the event of an Internet failure, five of the seven individuals would have to bring their key to a U.S. military base. Each key contains a portion of the DNSSEC root key.

Although I doubt the new cyber guardians would ever need to use the keys, the idea of this is just really cool. Props to ICANN for being a little less boring for once.

Source | Popular Science

]]>
Server Security Tips https://www.internetblog.org.uk/post/1571/server-security-tips/ Mon, 26 Jul 2010 15:51:31 +0000 http://www.internetblog.org.uk/post/1571/server-security-tips/

1. Do not allow direct root/administrator login
2. Make sure passwords are secure and changed regularly (by force if necessary)
3. Use a network firewall, such as APF
4. Use an application firewall, such as ModSecurity
5. Chroot all non-root users to keep them out of system directories
6. Use virus scanners and spam filters
7. Close mail server open relays
8. Keep all software and scripts up-to-date
9. Test your server for security holes
10. Keep up on the latest security news
11. Use SSL for secure data transactions
12. Set permissions as strictly as possible on any web-accessible files

Image Source: Wikimedia Commons

]]>
Mail Server Causing High Server Load https://www.internetblog.org.uk/post/1535/mail-server-causing-high-server-load/ Thu, 15 Jul 2010 16:26:42 +0000 http://www.internetblog.org.uk/post/1535/mail-server-causing-high-server-load/ Mail letter iconQuestion: My CPU usage on my server is very high, and it seems to be originated from my mail server. What could be the problem?

Answer: If your mail server is sucking up valuable CPU power, there are a couple of possibilities, none of which are pleasant.

1. You or users on your server are getting a lot of emails, more than usual. Although it is possible that it is just a temporary thing, it could be a deliberate attack on your server.

2. Someone is sending spam from your server, using an open relay in your SMTP settings or exploiting a user’s account.

3. Your server is receiving a ridiculous amount of spam (i.e. spam attack). This could be an intentional attack or just a particularly bad day.

Usually, if the CPU upswing is substantial, you should be really concerned about your server’s security. Take a look at the mail server logs and see where the emails are originating and where they are being sent. Take note of IP addresses, user names, and any other useful information. If you cannot figure it out, you can take the data to a security expert who can help you solve the problem.

]]>
Free SSH Programs for Download https://www.internetblog.org.uk/post/1510/free-ssh-programs-for-download/ Thu, 08 Jul 2010 17:42:14 +0000 http://www.internetblog.org.uk/post/1510/free-ssh-programs-for-download/ terminal emulator
SSH or Secure Shell is a secure method of accessing your web server for manipulation or file transfer (using SCP or SFTP). Here are a few software applications that you can use to access your server via SSH.

1. OpenSSH

OpenSSH is the primary SSH client and server used for Linux, BSD, Mac OS X and other Unix-like operating systems. It is free and open source and is part of the OpenBSD project. It includes scp and sftp for secure file transfers.

2. PuTTY

Although it works with both Windows and Unix, Putty is mostly used by Windows users, since SSH is not installed on Windows by default (unlike Linux and Mac OS X). PuTTY is free and open source.

GUI Applications

1. Filezilla

Filezilla is a file transfer application that includes support for scp and sftp. It is free, open source, and has cross-platform support.

2. WinSCP

A GUI file transfer program, WinSCP supports scp and sftp, and it is core is based on PuTTY. WinSCP is free and open source.

3. Cyberduck

Cyberduck is a file transfer application for Mac OS X that supports SFTP. It is free and open source software.

]]>
How to Connect via SSH https://www.internetblog.org.uk/post/1502/how-to-connect-via-ssh/ Tue, 06 Jul 2010 19:03:02 +0000 http://www.internetblog.org.uk/post/1502/how-to-connect-via-ssh/ SSH secure iconSSH stands for Secure Shell and is a secure encrypted method of connecting to a server for shell/command line access. It can be useful for shared hosting, virtual private servers, and dedicated servers. Linux server usually come with SSH enabled by default, although some web hosts may disable it for shared hosting accounts.

To connect to your server via SSH, simply type:

ssh -l(username) hostname_or_ip

It will prompt you for a password. Type your password, and you should be connected. Some web hosts may use a different port for SSH, other than the default port (22). If so, you will need to specify it, for example:

ssh -p 2222 -lmyname webserver.com

Normal Linux/Unix shell commands apply, once you are logged into the server. When you are finished, simply type “exit”.

]]>
Completely Delete Files with Shred https://www.internetblog.org.uk/post/1463/completely-delete-files-with-shred/ Thu, 24 Jun 2010 15:42:29 +0000 http://www.internetblog.org.uk/post/1463/completely-delete-files-with-shred/ Shredded paper with the words grace period
On a Linux dedicated server, the normal method for deleting files is to use the “rm” command. This removes the file from the current filesystem, but what many do not know is that those removed files are usually recoverable. As such, rm is more like putting something in the trash or recycle bin on a desktop.

The only way to effectively delete a file is to overwrite the space the file was using. You can accomplish that with the “shred” command. Just like shredding important physical documents, shred makes sure your files are good and gone, so please use with caution. Once it is gone, it is gone.

On a web server, you may want to make sure you delete sensitive information completely (a database of credit card numbers, for example). To do so, run the following command:

shred filename

You can also shred it a number of times just to be sure:

shred -n 7 filename

This will shred “filename” seven times. For more information about shred, type “man shred” from the command line.

Photo Source: Flickr

]]>
.Org and .EU now configured with DNNSEC https://www.internetblog.org.uk/post/1457/org-and-eu-now-configured-with-dnnsec/ Wed, 23 Jun 2010 17:37:56 +0000 http://www.internetblog.org.uk/post/1457/org-and-eu-now-configured-with-dnnsec/ keys
The Public Interest Registry and EURid, operators of the .org and .eu domain names respectively, announced the deployment of DNNSEC on the two gTLDs this week at the 38th ICANN meeting. The domains are the largest yet to adopt the new standard, which will bring greater security to Internet users.

As boring as it sounds, DNSSEC makes domains more secure by verifying and validating name server responses as they cross the Internet. It makes intercepting web traffic harder and can even stop hackers from redirecting visitors to fake sites.

The technology was expensive for the .org and .eu registries to implement, but I think it was worth it. It remains to see whether the general public is aware enough about the technology for it to have an effect on consumer choice for the extensions.

Source | Domain News
Photo | Flickr

]]>