This is a response header that indicates whether or not the response that is received can be shared with resources with the given origin. The directive, “origin” indicates to a specific uri which might access the resource. And, so browser should enforce it. For such requests that don’t have credentials, the server might specify wildcard (like “*”), that would thereby allow any origin so as to access that resource. […]

This is a response header which specifies a method or methods that are allowed while accessing the resource in response to a preflight request.This header is a comma-delimited list of all the methods supported by HTTP. It is to be noted that though a preflight request just asks for permissions only for a single HTTP method, this header can also include the whole list of all the supported methods in HTTP. […]

Scope of article

When it comes to securing network infrastructure, it is a common trend to invest into commercial grade appliances. It is found that security designers tend to ignore built-in security features available within a FOSS distro. This article explains few such features and helps decide when and how to use those in a given network scenario. […]

Scope of article

SSH service is very widely used in the open source infrastructure setups. Due to its small footprint on network, as well as ease of installation and maintenance, SSH replaces many remote shells in the modern data centers. OpenSSH is a very famous flavor of this protocol, and this article talks about such challenges and solutions.
[…]

Scope of article
In the last article we talked about Tripwire, which ensure the integrity of file system. In this article we extend the security from operating system and application files to one level further down. Disk encryption is a technique predominantly used in critical open source infrastructures. TrueCrypt is a utility widely used for this purpose. […]

Scope of article

With the increasing demand of cyber security in open source world, it has become important to know all the methods and tools available. There are many tools available, which can either be used manually, or embedded in a script to perform the automated security related tasks. With this article we are starting a mini-series of such security tools, where we will talk about small and useful security utilities available for open source systems. […]

Copyrights ©2008: Valency Networks Pvt Ltd.