This site may harm your computer Google and Firefox both provide safe browsing features. These tools try to identify potentially harmful sites by working with groups like StopBadware. If you…
Yesterday, I commented on how hardening host.conf file provides very little security. Today, I want to focus on another item often found on “server hardening” checklists: TMP directory hardening. While…
This is another installment of our Spam Blacklist Removal Series. In the first post, I covered how to remove your IP from Yahoo’s blacklist. I recommend reading the first post…
If you’ve ever looked at Linux server management companies, you often find a laundry list of “security” items that they apply to your servers. Many of these items are nothing…
I’ve previously written on how to stop email backscatter. In case you missed that post, email backscatter is when your server bounces and email to an unknown user. Since the…
A few weeks ago, I stumbled onto Zoho. Zoho is a SaaS provider delivering many business targeted applications. Since we provide linux server management services, you would think we would…
Over eight years ago, Scot Culp of Microsoft, published two white papers that get tossed around in security circles over and over. The 10 Immutable Laws of Security Administration and…