Content tagged as 'Ids'

Here is a list of all the content that has been tagged as [Intrusion Prevention System] ids.

Discussed in depth in a number of places in Holistic Info-Sec for Web Developers.

Also covered in Kim’s interview of Haroon Meer on Software Engineering Radio.

Holistic Info-Sec for Web Developers

A three part book series focused on lifting the security knowledge of Software Developers, Engineers, and their teams, so that they can continuously deliver secure technical solutions on time and within budget, without nasty surprises.

Evaluation of Host Intrusion Detection Systems (HIDS)

Redirects to legacy blog post.

The best time to install a HIDS is on a fresh install before you open the host up to the internet or even your LAN if it’s corporate. Of course if you don’t have that luxury, there are a bunch of tools that can help you determine if you’re already owned. Be sure to run one or more over your target system before your HIDS bench-marks it.

Installation and Hardening of Debian Web Server

Redirects to legacy blog post.

These are the steps I took to set-up and harden a Debian web server before being placed into a DMZ and undergoing additional hardening before opening the port from the WWW to it. Most of the steps below are fairly simple to do, and in doing so, remove a good portion of the low hanging fruit for nasty entities wanting to gain a foot-hold on your server->network.