Solved

Web portal security tool

Posted on 2002-07-05
7
235 Views
Last Modified: 2010-04-21
What is the best tools available to block hacker or cracker from accessing the web portal running on Linux Platform. Any sites or resources available ?

0
Comment
Question by:philipteh
7 Comments
 
LVL 6

Expert Comment

by:bira
ID: 7131732

  Hi
     The best way is to use a firewall.
     you can find a lot of sites about it by searching
     the internet.  search in www.altavista.com
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7131912
there is no "best tool"
It all depends on your requirements and your precautions.

Some more info on what you want to archive would help to give you more detailed answers.
0
 
LVL 28

Expert Comment

by:vinnyd79
ID: 7133074
I haven't tried it,but Ive heard this works well:

http://www.portsentry.com/products/portsentry.html
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 14

Accepted Solution

by:
chris_calabrese earned 50 total points
ID: 7138467
There are several issues here, each of which has several possible solutions

1.  Keeping attackers from accessing/attacking network services.  Solutions in this space are network firewalls, host firewalls (portsentry, IPtables, etc), and host hardening (Bastille Linux is your best bet here - http://bastille-linux.sourceforge.net/).
2.  Keeping attackers from attacking vulnerabilities in the web server software.  Solutions here include using web server software with a strong security track record, keeping up to date on web server patches, and possibly using application aware firewalls that try to detect/block HTTP-level attacks (such as Sanctum AppSheild, KaVaDo InterDo, or the HTTP-aware logic in firewalls from CheckPoint, Cisco, Symantec, and SecureComputing).
3.  Keeping attackers from attacking vulnerabilities in the scripting/CGI software you're using.  Solutions here are similar to those for #2.
4.  Reducing the damage if an attacker actually does break in.  This is a pretty broad topic, but most solutions revolve around host hardening, using a DMZ architecture to make it harder for the attacker to attack other servers in your infrastructure, and limiting trust relationships between servers.
5.  Detecting whether an attack has actually occured so you can react properly.  Solutions here include filesystem integrity checkers (such as Tripwire), host-based intrusion detection systems (such as LIDS), and network-based intrusion detection systems (such as SNORT).
5.
0
 
LVL 3

Expert Comment

by:gandalf94305
ID: 7163597
Generally, I would recommend a firewall or at least a port-filtering router. The router solution will probably be cheaper and still sufficient. Use an external component, not a firewall on the Linux system.

--gandalf.
0
 
LVL 20

Expert Comment

by:tfewster
ID: 7921555
No comment has been added lately, so it's time to clean up this Topic Area.
I will leave a recommendation for this question in the Cleanup topic area as follows:

- Answered by chris_calabrese

Please leave any comments here within the next 7 days

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER !

tfewster
Cleanup Volunteer
0
 

Expert Comment

by:SpideyMod
ID: 7967201
per recommendation

SpideyMod
Community Support Moderator @Experts Exchange
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Installing FreeBSD… FreeBSD is a darling of an operating system. The stability and usability make it a clear choice for servers and desktops (for the cunning). Savvy?  The Ports collection makes available every popular FOSS application and packag…
FreeBSD on EC2 FreeBSD (https://www.freebsd.org) is a robust Unix-like operating system that has been around for many years. FreeBSD is available on Amazon EC2 through Amazon Machine Images (AMIs) provided by FreeBSD developer and security office…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now