User authentication or “who is behind the keyboard” is one member of the “triple-A” or “AAA” trilogy in security: Authentication : Who are you? Authorization : Are you allowed here? Accounting : From where, how and when did you come here? Regarding the authentication, there are a lot of methods/technologies
Category: Software
ProxyStrike
Today, EdgeSecurity released a new tool: ProxyStrike. Like the WebScarab project supported by OWASP, its a web application proxy which will help you to find potential vulnerabilities in your web applications (don’t use it on third parties sites without the owner acknowledgement). Once started, it acts as a normal proxy:
Cisco Acquired Sguil
Announced on TaoSecurity, Cisco acquired Sguil. Sguil is a monitoring tool for network security anaylists. It provides realtime traffic analysis and goes deeper up to the raw packet level. Why is Sguild a nice opportinity for Cisco? It’s developed in TCL and high-end Cisco routers and switches have TCL builtin!
OpenSSH 4.9 is out!
OpenSSH 4.9 is out! This is a “must have” tool for my day-to-day job. Secure remote management, tunneling or file transfer. As usual, lot of bug fixes and improvements. I found the following interesting to notice: Added chroot(2) support for sshd(8) Accept the PermitRootLogin directive in a sshd_config(5) Match block.
Upgraded to 2.5
WordPress 2.5 is out! I successfully upgraded without downtime. The new administration interface looks very nice but, more important, let’s hope that security has been increased. I found this interesting post regarding a WordPress hack here.
Log Correlation For Free
Today, log files are everywhere! Each server or network component generates tons of log entries. All of them are interconnected to build complex infrastructures. Log files are often the first and only way to detect unusual events. The problem of security people is to be able the extract the right
Groundwork Security Dashboard
In its professional release, Groundwork has a nice feature: the dashboards. Like in your car, a dashboard helps you to have under control important parameters or values. In Groundwork, dashboards allow administrators: to safely distribute status information to specific group of users or roles to restrict information to specific group
PuTTY Connection Manager
As probably the majority of this blog readers, PuTTY is part of your software toolbox. For those who never heard the name “PuTTY”, it’s a free [ssh|telnet|raw|serial] client for Wintel systems. Please check the website for a complete overview. PuTTY has many options and can do almost everything at ssh/telnet
Follow Multiple Files with OpenBSD “tail”
On UNIX, the tail[1] command displays the last ten lines of a file by default. But there are many other options: Especially the “follow” flag (-f) which displays all new lines appended to the watched file. This a very basic but efficient monitoring tool. The GNU version of tail introduced
Weathermap Integration Into Groundwork Open Source
Groundwork is a well-known monitoring tool. In my job, I deploy Groundwork servers from small to quite very-complex infrastructures: it’s an amazing application. I’ll not describe it here, just go to the official web site for a detailed review. Groundwork is available in three versions: full open source and two