MRatWork Forum by Mustafa Ramadhan
Language Specific Discussions => Indonesia Users => Topic started by: Miki on 2014-03-11, 01:02:38
-
I need a module-level security 100%?
how to make config on top?
thanks for the advice to be given :)
??? step by step please ;D
-
1. IP Spoofing
2. FTP Attack
3. Unix Finger Exploits
4. Flooding & Broadcasting
5. Fragmented Packet Attacks
6. E-mail Exploits
7. DNS and BIND Vulnerabilities
8. Password Attacks
9.Proxy Server Attacks
10. Remote Command Processing Attacks
11. Remote File System Attack
12. Selective Program Insertions
13. Port Scanning
14.TCP/IP Sequence Stealing, Passive Port Listening and Packet
15. HTTPD Attacks
-
maaf OOT
- katanya djbdns lebih aman dibandingkan BIND
- mungkin bisa dipertimbangkan untuk memilih Hiawatha (tersedia pada versi 651 / dev)
ini testing terbaru ketika diserang https://www.hiawatha-webserver.org/weblog/64
-
dan ada Linux security patches and Hiawatha supaya bisa konek dengan 'grsecurity' dan 'apparmor' https://www.hiawatha-webserver.org/howto/linux_security_patches
juga ada server monitor https://www.hiawatha-webserver.org/howto/monitor
note: itu belum sy coba
........
ma'af oot, yang komeng di bawah pasti bisa memberi petunjuk