Solved

Web portal security tool

Posted on 2002-07-05
7
239 Views
Last Modified: 2010-04-21
What is the best tools available to block hacker or cracker from accessing the web portal running on Linux Platform. Any sites or resources available ?

0
Comment
Question by:philipteh
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 6

Expert Comment

by:bira
ID: 7131732

  Hi
     The best way is to use a firewall.
     you can find a lot of sites about it by searching
     the internet.  search in www.altavista.com
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7131912
there is no "best tool"
It all depends on your requirements and your precautions.

Some more info on what you want to archive would help to give you more detailed answers.
0
 
LVL 28

Expert Comment

by:vinnyd79
ID: 7133074
I haven't tried it,but Ive heard this works well:

http://www.portsentry.com/products/portsentry.html
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 14

Accepted Solution

by:
chris_calabrese earned 50 total points
ID: 7138467
There are several issues here, each of which has several possible solutions

1.  Keeping attackers from accessing/attacking network services.  Solutions in this space are network firewalls, host firewalls (portsentry, IPtables, etc), and host hardening (Bastille Linux is your best bet here - http://bastille-linux.sourceforge.net/).
2.  Keeping attackers from attacking vulnerabilities in the web server software.  Solutions here include using web server software with a strong security track record, keeping up to date on web server patches, and possibly using application aware firewalls that try to detect/block HTTP-level attacks (such as Sanctum AppSheild, KaVaDo InterDo, or the HTTP-aware logic in firewalls from CheckPoint, Cisco, Symantec, and SecureComputing).
3.  Keeping attackers from attacking vulnerabilities in the scripting/CGI software you're using.  Solutions here are similar to those for #2.
4.  Reducing the damage if an attacker actually does break in.  This is a pretty broad topic, but most solutions revolve around host hardening, using a DMZ architecture to make it harder for the attacker to attack other servers in your infrastructure, and limiting trust relationships between servers.
5.  Detecting whether an attack has actually occured so you can react properly.  Solutions here include filesystem integrity checkers (such as Tripwire), host-based intrusion detection systems (such as LIDS), and network-based intrusion detection systems (such as SNORT).
5.
0
 
LVL 3

Expert Comment

by:gandalf94305
ID: 7163597
Generally, I would recommend a firewall or at least a port-filtering router. The router solution will probably be cheaper and still sufficient. Use an external component, not a firewall on the Linux system.

--gandalf.
0
 
LVL 21

Expert Comment

by:tfewster
ID: 7921555
No comment has been added lately, so it's time to clean up this Topic Area.
I will leave a recommendation for this question in the Cleanup topic area as follows:

- Answered by chris_calabrese

Please leave any comments here within the next 7 days

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER !

tfewster
Cleanup Volunteer
0
 

Expert Comment

by:SpideyMod
ID: 7967201
per recommendation

SpideyMod
Community Support Moderator @Experts Exchange
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let's say you need to move the data of a file system from one partition to another. This generally involves dismounting the file system, backing it up to tapes, and restoring it to a new partition. You may also copy the file system from one place to…
Installing FreeBSD… FreeBSD is a darling of an operating system. The stability and usability make it a clear choice for servers and desktops (for the cunning). Savvy?  The Ports collection makes available every popular FOSS application and packag…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.
Suggested Courses

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question