Blog Posts Tagged with "Administration"

Ebb72d4bfba370aecb29bc7519c9dac2

Bottom Eleven Log Management Worst Practices

February 08, 2011 Added by:Anton Chuvakin

Many organizations talk about “best practices”. The definition is often fuzzy but can be loosely related to the practices that generally lead to great results. Following the same model, here are the “worst practices” in the area of SIEM and log management that I have observed over the years:..

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Eleven Log Management Resolutions for 2011

February 01, 2011 Added by:Anton Chuvakin

One of the simplest ways to commit to logging in 2011 is to commit to monitoring when logging stops. Apart from being a violation of a few regulatory compliance mandates, termination of logging – whether due to an attacker or by mistake – is something you need to know right when it happens...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Why Microsoft Shops Have to Worry About Security

January 26, 2011 Added by:Danny Lieberman

If you are a real hacker, look for companies with security administrators who are certified for Microsoft ISA server and you will have nothing to worry about. But if your target security administrators are facile with Wireshark, Ratproxy and Fiddler and Metasploit, then you should be really worried...

Comments  (12)

4085079c6fe0be2fd371ddbac0c3e7db

Tips for Taking Charge of a SysAdmin Team

January 16, 2011 Added by:Jamie Adams

When I enter the organization, I don't immediately request access to the systems but rather I begin going over architectural diagrams, operational procedures, and peering over the shoulders of the system administrators. If the aforementioned documents are not present, then we have a problem...

Comments  (1)

4085079c6fe0be2fd371ddbac0c3e7db

Tips for Deploying Secure Shell in Linux and UNIX

January 10, 2011 Added by:Jamie Adams

Secure Shell is the best method for remote access due to its flexibility and security. It makes it attractive for system administrators as well as system developers and architects. The ability to easily execute commands on remote systems and retrieve files over “secure” channels is seductive...

Comments  (14)

065b7cfbbb03ac9d18cbf5ed0615b40a

Realizing the Potential of Virtualization

January 06, 2011 Added by:Stefan Fouant

In order for the vision of virtualization to realize it's true potential, the physical mold we have become accustomed to will have to be broken. Resources will need to be pooled together and this just isn't effective or scalable within the confines of traditional server chassis as we know it today...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Using Temporary Files in Linux Scripts Securely

December 07, 2010 Added by:Jamie Adams

Some sysadmins who write scripts might store sensitive data in temporary files, don't restrict access to temporary files, and might forget to remove them from the system when they are no longer needed. In many cases, they use them when it isn't even necessary...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Understanding the Domain Name System

November 29, 2010 Added by:Global Knowledge

The DNS takes advantage of the context-based memory clues that names provide and translates those names into IP addresses. Network managers can also take advantage of this name to address mapping to control traffic to various servers in their networks...

Comments  (1)

4085079c6fe0be2fd371ddbac0c3e7db

LISA 2010: Sysadmins Discuss Virtual Mentorship

November 23, 2010 Added by:Jamie Adams

There are system administrators focused on different operating systems, cluster specialists, network administrators, database administrators, system virtualization managers, and even security administrators. Our field also seems to have as many specialists as the medical community...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

LISA 2010: OS Security In The Cloud

November 21, 2010 Added by:Jamie Adams

Unused services should and must still be disabled, discretionary access controls tightened, and regular software updates applied. The same holds true when it comes to operating system images deployed in the cloud...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Which Linux or UNIX Version Am I Running?

November 17, 2010 Added by:Jamie Adams

Linux distributions are built off of standard kernels but are packaged and bundled differently. Some distributions are Debian-based while others might be Red Hat-based. The collection of packages and how the packages were compiled and delivered are what make Linux distributions unique...

Comments  (2)

Page « < 1 - 2 > »