your bytes leave the application layer on Host A and travel through the transport and network layers on Host A; then they go down to the physical medium, across the medium, and up again through the various lower levels to the application layer on Host B in much the same way. If...
To address penetration tests findings against our Windows 2012 R2 servers, we were asked to disable TCP SYN/ACK time stamps because it allows an attacker to know the system uptime and figure out if a security patch that requires a reboot has not been installed.Please note, this is no...
o Block as much as possible with a firewall. Unix systems have a number of internal services that you may not know about (such as TCP port 111 for the RPC port-mapping server), and no other system in the world should know about them. It can be very difficult to track and regulate ...
"The function evaluation requires all threads to run" while accessing music library through wmp.dll "The left-hand side of an assignment must be a variable, property or indexer". Help? "The remote server returned an error: (401) Unauthorized" "Typewriter" like effect in a C# Console a...
Re: How to Secure SMTP services ? The first question is do you send/receive email within your Unix systems?If the answer is no then simply disable the daemon altogether by setting sendmail to 0 in "/etc/rc.config.d/sendmail". Remember that even after doing this you can still send mai...
FTP is similar to the hypertext transfer protocol (HTTP) and simple mail transfer protocol (SMTP) but handles a different data type. It is essential for managing remote systems like a virtual private server (VPS).In this article, we will explain how to set up an FTP server on an Ubuntu ...
Update your domain from your registrar to use Linode’s authoritative name servers. Blocked SMTP Ports If your data center blocks inbound traffic on TCP ports 25, 465, or 587, open a Support ticket requesting inbound and outbound access to these ports be opened for your server. Optional: Up...
commonly used implementation of this protocol is OpenSSH which is included in most Unix-based operating systems like the majority of Linux distributions and OS X, in a Windows environment the PuTTY SSH client is a popular alternative. Check out our article forConnecting to Your Serverto learn ...
Use exact names in server_name directive where possible Avoid checks server_name with if directive Make an exact location match to speed up the selection process Use limit_conn to improve limiting the download speed Hardening Run as an unprivileged user Disable unnecessary modules Protect sensitive...
Avoid checks server_name with if directive Make an exact location match to speed up the selection process Use limit_conn to improve limiting the download speed Hardening Run as an unprivileged user Disable unnecessary modules Protect sensitive resources Hide Nginx version number Hide Nginx server sig...