Category : Security

 

 Nginx is a robust and fast reverse proxy. Haproxy is a fast application load balancer. Together can be used for publishing to internet web services in security way. For this reason this article has the objective to explain how to secure web services using nginx and haproxy. The haproxy, in addition to application load balancer functionality, has a ..

Read more

 

 The need to trust freeipa identity management with active directory is very interesting. It permits to centralize the user management leaving in freeipa the authorization process. Very useful for system administrator to have to manage one only user account. In this context this article explains how to integrate Freeipa with Active Directory describing all the kerberos packets involved in ..

Read more

 

 Kerberos is the protocol most used in modern authentication system. Active Directory and other Identity management (like freeipa) use it for offer a single sign-on authentication method. Of course a good kerberos understanding is necessary by system administrator. Give an answer to this need is the scope of this article. All the examples have been implemented in ..

Read more

 

 In this article I will show how to configure Pfsense Firewall and Suricata IDS with Kibana dashboard. The explained architecture will provide a modern and functional IDS with a good graphical user interface without spending money in commercial products. The solution permit to monitor in real time attack attempts to network services and to activate, if necessary, the ..

Read more

 

 Today the most dangerous malware like rasomware and crypto malware infect the systems propagating via email or social network. A  document (doc, execl, pdf, javascript) containing malware code is distributed to end users; if some click on it, its system is infected. The malware payload (javascript or visual basic) contains only the code for downloading the binary that executes the ..

Read more

 

 System and network administrators in order to protect IT and business company from hacker attacks should have a minimal knowledge about web application penetration testing. This why no one is free to hacker attacks and thinking that hackers are not interested to our website is not good reason for not taking right security actions because, for example, it could be ..

Read more

 

 This article explains how to use openssl for creating, converting and managing the all possible type of ssl certificates looking inside the CA and the certificates. The discussion is divided into three sections: certificate understanding, creating and managing ssl certificate and converting ssl certificate. Let’s start with the first section. SSL Certificate understanding A ssl certificate is ..

Read more