Webserver Secure Tutorial
199 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by webserversecuretutorial
Scoop.it!

Cryptographic improvements in ASP.NET 4.5

Cryptographic improvements in ASP.NET 4.5 | Webserver Secure Tutorial | Scoop.it
Several features of ASP.NET were designed with security in mind –  see the ViewState protection for example –  from the early days of the platform, although those days were quite a while ...
more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

ddos | Exceliance – Aloha Load Balancer

Posts about ddos written by Baptiste Assmann...
more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

Serveur proxy ou mandataire, firewall ou pare-feu

Au contraire du firewall, le serveur proxy est rarement utile à l'entreprise...
more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

iis7 - IIS 7 URL Rewrite or Reverse Proxy to Handle Firewall Security

more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

network - How can reverse proxies be used to bypass acceptable use policies of a company? - IT Security

network - How can reverse proxies be used to bypass acceptable use policies of a company? - IT Security | Webserver Secure Tutorial | Scoop.it
more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

Securing IIS and SQL Server as part of an online platform

Learn how to protect the platform between your database and the web beginning with keeping your DMZ machines as distant from your internal domain as possible.

 

 

more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

Risks associated with Reverse-Proxy

We used to put the Web servers in the DMZ and the Application Servers in the LAN. Now we are discussing the risks and benefits of an architecture with a Reverse-Proxy in the DMZ and the rest of the servers (Web & Application servers) in the LAN. What do you think about this change? What are the risks associated with an architecture based on a Reverse-Proxy?

 



more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

CloudFlare - Free Reverse Proxy, Firewall, and Global CDN | drupal.org

CloudFlare - Free Reverse Proxy, Firewall, and Global CDN | drupal.org | Webserver Secure Tutorial | Scoop.it

CloudFlare is a FREE reverse proxy, firewall, and global content delivery network and can be implemented without installing any server software or hardware.

more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

Implement a reverse proxy to secure corporate data | TechRepublic

Implement a reverse proxy to secure corporate data | TechRepublic | Webserver Secure Tutorial | Scoop.it
This tip describes how reverse proxies work to secure your Web server and provides guidance on implementation.

 

Let's look at how reverse proxies work. An unknown client opens a browser and enters the URL of your Web site. DNS or Network Address Translation (NAT) at your firewall or router redirects the Web content request to the reverse proxy.

The reverse proxy then checks its cache for the request and sends the content to the unknown client. Or the reverse proxy sends a request to the Web server for content and sends the request back to the unknown client.

 

You can create another security layer for your data by leaving "trusted" content servers on your internal network and placing the reverse proxy in your demilitarized zone (DMZ). This isolates public servers from private "trusted" servers. This additional security layer forces an attacker to attack the proxy because the firewall allows only the proxy to communicate with the Web content servers.

more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

Five Steps to Password Security - Developer Best Practices Video | Stormpath

Video on password security best practices for developers: password hashing and salts, digest authentication and advanced techniques...
more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

Preserve source IP address despite reverse proxies

Preserve source IP address despite reverse proxies | Webserver Secure Tutorial | Scoop.it
What is a Reverse-Proxy? A Reverse-proxy is a server which get connected on upstream servers on behalf of users. Basically, it usually maintain two TCP connections: one with the client and one with...
more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

networking - Reverse Proxy - should it be a different technology stack? - Server Fault

more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

Securing Web Applications through a Secure Reverse Proxy | Understanding the Reverse Proxy Server | InformIT

Securing Web Applications through a Secure Reverse Proxy | Understanding the Reverse Proxy Server | InformIT | Webserver Secure Tutorial | Scoop.it
This article describes recommended practices for setting up the Sun ONE Proxy Server software to represent a secure content server to outside clients, preventing direct, unmonitored access to your server's data from outside your company.
more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

Reference Architecture 1: Port Summary for Single Consolidated Edge

Reference Architecture 1: Port Summary for Single Consolidated Edge | Webserver Secure Tutorial | Scoop.it
more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

If one server in a DMZ network gets attacked from outside, will the other servers be corrupted?

A DMZ security server is not invincible, but a server firewall can help.
more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

Firewall and IDS architecture setup for SMBs

Firewall and IDS architecture setup for SMBs | Webserver Secure Tutorial | Scoop.it

A dual firewall consists of two firewalls with bastion hosts in between. One of the two firewalls faces the Internet and is the external interface of your network, and the other is the gateway between your internal network and the demilitarized zone (DMZ), 

more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

Considerations When Setting Up Your DMZ's Reverse Proxy and Firewall

Considerations When Setting Up Your DMZ's Reverse Proxy and Firewall | Webserver Secure Tutorial | Scoop.it
Things to consider when setting up a reverse proxy and firewalls in a DMZ.
more...
No comment yet.
Scooped by webserversecuretutorial
Scoop.it!

Proxy server types and uses for HTTP Server (powered by Apache)

A reverse proxy is another common form of a proxy server and is generally used to pass requests from the Internet, through a firewall to isolated, private networks. It is used to prevent Internet clients from having direct, unmonitored access to sensitive data residing on content servers on an isolated network, or intranet. If caching is enabled, a reverse proxy can also lessen network traffic by serving cached information rather than passing all requests to actual content servers. Reverse proxy servers may also balance workload by spreading requests across a number of content servers. One advantage of using a reverse proxy is that Internet clients do not know their requests are being sent to and handled by a reverse proxy server. This allows a reverse proxy to redirect or reject requests without making Internet clients aware of the actual content server (or servers) on a protected network.

A reverse proxy server will first check to make sure a request is valid. If a request is not valid, or not allowed (blocked by the proxy), it will not continue to process the request resulting in the client receiving an error or a redirect. If a request is valid, a reverse proxy may check if the requested information is cached. If it is, the reverse proxy serves the cached information. If it is not, the reverse proxy will request the information from the content server and serve it to the requesting client. It also caches the information for future requests.

more...
No comment yet.