An intrusion detection system (IDS) can perform log analysis, check file integrity, monitor policy changes, and keep an eye out for rootkit installations and alert you when a threat is first suspected. The IDS that I chose for my host was OSSES HIDS, an open source host-based Intrusion Detection System offered by Trend Micro. Here’s how I installed OSSEC on my hosted Linux VPS and Splunk on a local Windows machine to monitor.
My firewall caught some odd injection attempts which lead to research on the intent of the hackers. Turns out it was an attempt to gain Shell access via Local File Inclusion vulnerabilities and injection of malicious code in proc/self/environ. Research lead to the following step-by-step instructions on what was being attempted (listed below).
Using iTalc on your private home network, you can monitor your kid’s activities and keep an eye on what websites they are browsing, what they are doing on social networking sites like Facebook, and even watch as they read their email. There are other tools that offer similar functions such as keylogging tools and web site blockers, but iTalc is a perfect addition to your arsenal of child protection tools.
Encryption and Authentication DESCRIPTION Privacy protection using DES (symmetric algorithm) involves the use of two secret keys. Each party must share their secret key with others. This makes this sort of encryption difficult to use in web technologies. RSA public key encryption (asymmetric) solves this problem. RSA uses matched pairs of encryption and decryption keys.…