Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Web portal security tool

Posted on 2002-07-05
7
Medium Priority
?
241 Views
Last Modified: 2010-04-21
What is the best tools available to block hacker or cracker from accessing the web portal running on Linux Platform. Any sites or resources available ?

0
Comment
Question by:philipteh
7 Comments
 
LVL 6

Expert Comment

by:bira
ID: 7131732

  Hi
     The best way is to use a firewall.
     you can find a lot of sites about it by searching
     the internet.  search in www.altavista.com
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 7131912
there is no "best tool"
It all depends on your requirements and your precautions.

Some more info on what you want to archive would help to give you more detailed answers.
0
 
LVL 28

Expert Comment

by:vinnyd79
ID: 7133074
I haven't tried it,but Ive heard this works well:

http://www.portsentry.com/products/portsentry.html
0
Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

 
LVL 14

Accepted Solution

by:
chris_calabrese earned 200 total points
ID: 7138467
There are several issues here, each of which has several possible solutions

1.  Keeping attackers from accessing/attacking network services.  Solutions in this space are network firewalls, host firewalls (portsentry, IPtables, etc), and host hardening (Bastille Linux is your best bet here - http://bastille-linux.sourceforge.net/).
2.  Keeping attackers from attacking vulnerabilities in the web server software.  Solutions here include using web server software with a strong security track record, keeping up to date on web server patches, and possibly using application aware firewalls that try to detect/block HTTP-level attacks (such as Sanctum AppSheild, KaVaDo InterDo, or the HTTP-aware logic in firewalls from CheckPoint, Cisco, Symantec, and SecureComputing).
3.  Keeping attackers from attacking vulnerabilities in the scripting/CGI software you're using.  Solutions here are similar to those for #2.
4.  Reducing the damage if an attacker actually does break in.  This is a pretty broad topic, but most solutions revolve around host hardening, using a DMZ architecture to make it harder for the attacker to attack other servers in your infrastructure, and limiting trust relationships between servers.
5.  Detecting whether an attack has actually occured so you can react properly.  Solutions here include filesystem integrity checkers (such as Tripwire), host-based intrusion detection systems (such as LIDS), and network-based intrusion detection systems (such as SNORT).
5.
0
 
LVL 3

Expert Comment

by:gandalf94305
ID: 7163597
Generally, I would recommend a firewall or at least a port-filtering router. The router solution will probably be cheaper and still sufficient. Use an external component, not a firewall on the Linux system.

--gandalf.
0
 
LVL 21

Expert Comment

by:tfewster
ID: 7921555
No comment has been added lately, so it's time to clean up this Topic Area.
I will leave a recommendation for this question in the Cleanup topic area as follows:

- Answered by chris_calabrese

Please leave any comments here within the next 7 days

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER !

tfewster
Cleanup Volunteer
0
 

Expert Comment

by:SpideyMod
ID: 7967201
per recommendation

SpideyMod
Community Support Moderator @Experts Exchange
0

Featured Post

How to Use the Help Bell

Need to boost the visibility of your question for solutions? Use the Experts Exchange Help Bell to confirm priority levels and contact subject-matter experts for question attention.  Check out this how-to article for more information.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you do backups in the Solaris Operating System, the file system must be inactive. Otherwise, the output may be inconsistent. A file system is inactive when it's unmounted or it's write-locked by the operating system. Although the fssnap utility…
Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.
Suggested Courses

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question