SEARCH KEYWORD -- Server security



  Evolution mail configuration with Hotmail on Ubuntu

Evolution mail now is the default Email client on Ubuntu. When we configure this mail client with Hotmail. The steps should be followed.   Step 1: Open Evolution mail through Applications->Internet->Evolution mail    Step 2: Goto Edit->Preferences   Step 3 : Click Add button or double click on the added mail account.   Step 4 : On the Identity tab, fill the Hotmail account you want to use.    Step 5 : On "Receiving email" Tab,      ...

   Ubuntu,Evolution mail,Hotmail,Configurat     2011-04-28 09:24:01

  Resolving SVN error "Error validating server certificate for..."

When using SVN to connect secure server, the server needs to send its certificate to the client for verification. In some cases, the certificate sent by the server is not a trusted certificate, the client may choose to trust the certificate if the server is target server for sure.  But users may get "Error validating server certificate for 'https://...'" the next time when they try to connect to the same secure server even if they specified "p" the first time when they are prompted to accep...

   SSL,SVN,SVN.SSL.SERVER     2016-06-27 07:36:49

  Leveraging Dedicated Server Hosting for Data Analytics Firms

In the age of data-driven decision making, data analytics firms require powerful and reliable computing resources to extract insights from massive data sets. A dedicated server is a type of server that is solely allocated to a single user or organization. In this article, we will explore the benefits of using a dedicated server for data analytics firms. Enhanced Performance A dedicated server offers enhanced performance that cannot be matched by other types of servers. Here are some of the benef...

   HOSTING SERVICE     2023-05-12 04:18:56

  Difference between keystore and truststore

Security has become a vital concern in most of the online transactions nowadays. Lots of the world's most popular websites have adopted security protocols to transfer data, especially sensitive data. These security protocols including SSL/TLS which are using the private/public key exchange mechanism to establish secure connections.  The private/public key cryptography is a really important invention and it allows data to be transferred securely and solves the big problem of transferrin...

   KEYSTORE,TRUSTSTORE,SECURITY,SSL     2017-03-04 07:52:47

  8 very useful and free web security testing tools

With more pervasive of web applications, web security threats are becoming increasingly prominent. Hackers gain web server control by exploiting web server vulnerabilities and SQL injection vulnerabilities, then they may tamper with web content, or steal important internal data, the more serious is to inject malicious code into web pages to affect visitors of websites. Attention is gradually warming up to Web Application Security. Here we recommend eight very useful and free web security testing...

   Website, security,Web security,Attack     2012-07-22 10:59:09

  How to apply Domain Level Group Policy

As a system administrator, you may often need to create a Windows domain of a computer network in which all user accounts, computers, printers and other security principals, are registered with a central database (called a directory service). Also one or more domain controllers need to be deployed to enable managing the domain. In this post, we will show you how to apply Domain Level Group Policy. There are lots of posts which have covered how to promote a Windows server to a Domain Controller. ...

   Group Policy,Domain Controller,Account Policy, GPO     2015-03-19 03:46:34

  Run MySQL on Command Line in Windows

Sometimes if we want to run MySQL but we don't have phpMyAdmin installed. What should we do?On Windows we can run MySQL in following steps:Open Console Window->Type "mysqld -u root". This means we start the mysql server with username root. This program will handle all the communications between our console window and the actual data;After starting the server, we need to use a client to connect to the server and communicate with it. the mysql program is right for this. Next in the command cons...

   mysql,console,command line,windows,defau     2011-08-21 04:14:58

  Remote form submission

Remote form submission is way of submitting HTML forms from local to a particular remote server. This is used by many advertisers, spammers or even hackers to submit bad data to other websites in order to get what they want. They can write some automation scripts to help them do spamming. How can people do remote form submission and how to prevent this kind of attacks? Since a website can be accessed by almost every one, so one can save a local copy of a HTML form of a website through File->S...

   PHP,Security,Remote form submission     2013-07-14 01:04:49

  Generate certificate in Java -- Self signed certificate

This is the first post in this series which I will show you how to generate SSL certificate in Java programmatically. Certificates are frequently used in SSL communication which requires the authentication of server to client. This is to make the client to trust that the server is actually the one it claims. Certificates are really important on the Internet. All HTTPS communications on the Internet need the server side to present their certificates signed by trusted CAs. The basic flow of a requ...

   Java,Certificate,X509     2014-07-30 07:42:18

  Web Security: In-Depth Explanation of X-XSS-Protection

What is X-XSS-Protection X-XSS-Protection is an HTTP response header designed to enable or configure built-in cross-site scripting (XSS) filters in certain versions of Internet Explorer, Chrome, and Safari. The purpose of these filters is to detect reflected XSS attacks in the response and prevent the loading of pages, thereby protecting users from such attacks. The X-XSS-Protection response header was initially introduced by Microsoft in Internet Explorer 8 to control the browser's XSS filter. ...

   X-XSS-PROTECTION,WEB SECURITY,CONTENT SECURITY POLICY,XSS,CSP     2023-11-29 01:48:40