Solved

Web portal security tool

Posted on 2002-07-05
7
237 Views
Last Modified: 2010-04-21
What is the best tools available to block hacker or cracker from accessing the web portal running on Linux Platform. Any sites or resources available ?

0
Comment
Question by:philipteh
7 Comments
 
LVL 6

Expert Comment

by:bira
ID: 7131732

  Hi
     The best way is to use a firewall.
     you can find a lot of sites about it by searching
     the internet.  search in www.altavista.com
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7131912
there is no "best tool"
It all depends on your requirements and your precautions.

Some more info on what you want to archive would help to give you more detailed answers.
0
 
LVL 28

Expert Comment

by:vinnyd79
ID: 7133074
I haven't tried it,but Ive heard this works well:

http://www.portsentry.com/products/portsentry.html
0
Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

 
LVL 14

Accepted Solution

by:
chris_calabrese earned 50 total points
ID: 7138467
There are several issues here, each of which has several possible solutions

1.  Keeping attackers from accessing/attacking network services.  Solutions in this space are network firewalls, host firewalls (portsentry, IPtables, etc), and host hardening (Bastille Linux is your best bet here - http://bastille-linux.sourceforge.net/).
2.  Keeping attackers from attacking vulnerabilities in the web server software.  Solutions here include using web server software with a strong security track record, keeping up to date on web server patches, and possibly using application aware firewalls that try to detect/block HTTP-level attacks (such as Sanctum AppSheild, KaVaDo InterDo, or the HTTP-aware logic in firewalls from CheckPoint, Cisco, Symantec, and SecureComputing).
3.  Keeping attackers from attacking vulnerabilities in the scripting/CGI software you're using.  Solutions here are similar to those for #2.
4.  Reducing the damage if an attacker actually does break in.  This is a pretty broad topic, but most solutions revolve around host hardening, using a DMZ architecture to make it harder for the attacker to attack other servers in your infrastructure, and limiting trust relationships between servers.
5.  Detecting whether an attack has actually occured so you can react properly.  Solutions here include filesystem integrity checkers (such as Tripwire), host-based intrusion detection systems (such as LIDS), and network-based intrusion detection systems (such as SNORT).
5.
0
 
LVL 3

Expert Comment

by:gandalf94305
ID: 7163597
Generally, I would recommend a firewall or at least a port-filtering router. The router solution will probably be cheaper and still sufficient. Use an external component, not a firewall on the Linux system.

--gandalf.
0
 
LVL 20

Expert Comment

by:tfewster
ID: 7921555
No comment has been added lately, so it's time to clean up this Topic Area.
I will leave a recommendation for this question in the Cleanup topic area as follows:

- Answered by chris_calabrese

Please leave any comments here within the next 7 days

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER !

tfewster
Cleanup Volunteer
0
 

Expert Comment

by:SpideyMod
ID: 7967201
per recommendation

SpideyMod
Community Support Moderator @Experts Exchange
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
sort command HPUX 11 82
How to check the PVU´s on AIX TSM servers? 3 105
bash while loop reading input from data section in script 7 71
Martian Packets Unix 5 67
Hello fellow BSD lovers, I've created a patch process for patching openjdk6 for BSD (FreeBSD specifically), although I tried to keep all BSD versions in mind when creating my patch. Welcome to OpenJDK6 on BSD First let me start with a little …
Let's say you need to move the data of a file system from one partition to another. This generally involves dismounting the file system, backing it up to tapes, and restoring it to a new partition. You may also copy the file system from one place to…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question