Top 10 Web Log Analyzers

Title: Top 10 Web Log Analyzers Scope of article Today’s web hosting data centers are deployed with multiple web servers, running heterogeneous operating systems architecture. With ever increasing online businesses, it is important to know how many customers are really reaching to your websites. Beyond just the number of web hits, it is now imperative…

Top 10 Security Vulnerability Scanners

Title: Top 10 Security Vulnerability Scanners Scope of article Gone are the days when a network administrator would sit in his cozy datacenter room, sip coffee and look at monitors showing datacenter stats. Today’s cyber world forces admin teams to deal with challenges which are beyond just the machine related problems. Modern datacenters deploy firewalls…

Top 5 Security Assessment Tools

Title: Top 5 Security Assessment Tools While performing a vulnerability scanning against a network, it needs to be done from within the network as well as from external, or simply put, from either sides of the firewall protecting the network. A methodical approach suggested is to start from network evaluation phase where sniffing and primary…

Top 3 Network Monitoring Tools

Title: Top 3 Networks Monitoring Tools Scope of article In a well managed IT infrastructure, network monitoring acts as eyes and ears to spot problems before they appear. System administrators need a complete visibility into their critical IT components such as servers, applications and networks. These tools can monitor a server crash or a failing…

Securing Xen Virtualization

Title: Securing Xen Virtualization Scope of article The concept of virtualization was created in IT industry to achieve easy management and maintenance of the server infrastructure. While there are many production environments running on robust virtual servers, there are underlying security challenges which should be carefully addressed while designing virtualization solutions. This article talks about…

Securing SSH Service

Title: Securing SSH Service Scope of article SSH service is very widely used in the open source infrastructure setups. Due to its small footprint on network, as well as ease of installation and maintenance, SSH replaces many remote shells in the modern data centers. Though SSH stands for Secure Shell, it is found to be…

Securing MySQL Server

Title: Cyber Attacks Explained: Securing MySQL Server Scope of article MySQL server is widely used in the open source world. Let it be a small firm’s finance data or a mission critical ERP system, MySQL has its foot print due to great performance and compatibility. However it is also plagued with security challenges, just as…

Open Source Security Tools – TrueCrypt

Title: Open Source Security Tools: TrueCrypt Scope of article In the last article we talked about Tripwire, which ensure the integrity of file system. In this article we extend the security from operating system and application files to one level further down. Disk encryption is a technique predominantly used in critical open source infrastructures. TrueCrypt…

Open Source Security Tools – Tripwire

Title: Open Source Security Tools: Tripwire Scope of article With the increasing demand of cyber security in open source world, it has become important to know all the methods and tools available. There are many tools available, which can either be used manually, or embedded in a script to perform the automated security related tasks.…

FOSS Built-In Security

Title: Built-in FOSS Security Scope of article When it comes to securing network infrastructure, it is a common trend to invest into commercial grade appliances. It is found that security designers tend to ignore built-in security features available within a FOSS distro. This article explains few such features and helps decide when and how to…