[Imc-miami-tech] imc web comments
eyeofthestormradio at hotmail.com
Tue May 3 11:39:54 PDT 2005
to: web tech group
here is a comment i found on the site
what do you think?
what to do
by Benjamin Monday, May. 02, 2005 at 10:51 PM
Here's what you do:
Run on Linux (or bsd) with no ports open other than 80.
Run Apache latest production version.
Make sure your PHP is tight (ie. no publicly accessible
Run a firewall in front of your local director like
Make sure your inside network addresses are non routables
and that yer hosting facility border routers are actually
discarding the non routables.
Have your sys admins read bugtraq religiously and
patch your s**t ASAP when a remote exploit comes
What NOT to do:
Do NOT run yer s**t on anything other than UNix.
Do not run yer s**t on anything other than open source
softwares, because they get fixed much faster than non
open sourced products.
Do not allow project managers to have anything to do
with the design of networks or installations.
They simply do not have the skillz necessary.
(Example, tardo wants to put the firewall between
the webservers and the database box because it will
"run faster" and have no firewall in front of the
webservers. This is Wrong.)
Finally, if you're getting exploited or taken down by
some obscure mal aligned packet infoze ICMP etc
then do make sure your firewall ruleset is correct.
Make sure your firewall LOGS the ip's of any
funky packets it receives. You'll need this for
proper forensics after the fact.
Course, this might be a sploit 4 PHP or something.
Do probe around your hosting centers s**t to see if
_they_ have any vulnerabilities and promptly inform
them of any you find.
Take it easy.
PS. I am out of a Job courtesy this administration.
Someone in India is making a few bucks so I can
sit on my ass in America and watch chemtrails in my skies.
add your comments
Dont just search. Find. Check out the new MSN Search!
More information about the Imc-miami-tech