protection

Protect yourself against Dos attacks

那年仲夏 提交于 2019-11-27 03:12:33
This might be something more suited for Serverfault, but many webdevelopers who come only here will probably benefit from possible answers to this question. The question is: How do you effectively protect yourself against Denial Of Service attacks against your webserver? I asked myself this after reading this article For those not familiar, here's what I remember about it: a DoS attack will attempt to occupy all your connections by repeatedly sending bogus headers to your servers. By doing so, your server will reach the limit of possible simultanious connections and as a result, normal users

Can a secret be hidden in a 'safe' java class offering access credentials?

会有一股神秘感。 提交于 2019-11-27 02:51:17
问题 This is a brainstorming question about what's possible in Java (or not). I want to know if it is possible to hide a secret within a class and prevent anymore from accessing it using Java code or any of its feature only (security, reflexion, serialization, class loaders, you-name-it...). Here is what I have in mind so far: public final class Safe { private String secret; private HashMap<String, Credentials> validCertificates = new HashMap<String, Credentials>(); public Safe(String aSecret) {

Protecting the content of public/ in a Rails app

二次信任 提交于 2019-11-27 00:31:00
问题 I'm maintaining a Rails app that has content in the public/ folder that will now need to be protected by a login. We're considering moving those folders of files into a path outside of public/ and writing a Rails controller to serve up the content. Before we begin writing this, I was curious if anyone else has ran into this sort of problem? I looked for some gems / plugins that might already do this but didn't find anything. Has anyone created a gem for this? 回答1: I've done this on a site

When and how to use GCC's stack protection feature?

吃可爱长大的小学妹 提交于 2019-11-26 19:36:49
I have enabled the -Wstack-protector warning when compiling the project I'm working on (a commercial multi-platform C++ game engine, compiling on Mac OS X 10.6 with GCC 4.2). This flag warns about functions that will not be protected against stack smashing even though -fstack-protector is enabled. GCC emits some warnings when building the project: not protecting function: no buffer at least 8 bytes long not protecting local variables: variable length buffer For the first warning, I found that it is possible to adjust the minimum size a buffer must have when used in a function, for this

How can I obfuscate my c# code, so it can't be deobfuscated so easily? [closed]

对着背影说爱祢 提交于 2019-11-26 17:42:56
I release a bunch of tools for free, but recently I have began to sell an application, that has private research, and people have been able to get my source code, and one person publically released my entire source. I spent a lot of time on this program, just to have someone crack it, and release my entire source. How can I go about protecting my program? I have tried HWID, but people are still able to crack it. I know I am limited by C#, but it the most convenient to use. I just need a way to protect my programs from people trying to do this. Sebastiaan van den Broek You could have a look at

How can you protect/encrypt your Java classes?

坚强是说给别人听的谎言 提交于 2019-11-26 16:57:30
问题 Some time ago, in my work I needed to protect some classes against other people to read the code. For that purpose, I created a EncryptedClassLoader, that loaded previously encrypted classes, and can load normal (not encrypted) classes as well. Working in that way was a little complicated, and testing too (compile, then encrypt, and then decrypt). Is there any free framework to do what I needed, and is easy to handle? I mean, not only obfuscate, but also encrypt the files, so none can read or

Mandatory file lock on linux

怎甘沉沦 提交于 2019-11-26 16:48:09
问题 On Linux I can dd a file on my hard drive and delete it in Nautilus while the dd is still going on. Can Linux enforce a mandatory file lock to protect R/W? 回答1: To do mandatory locking on Linux, the filesystem must be mounted with the -o mand option, and you must set g-x,g+s permissions on the file. That is, you must disable group execute, and enable setgid. Once this is performed, all access will either block or error with EAGAIN based on the value of O_NONBLOCK on the file descriptor. But

Palo Alto for NGFW facts from Checkpoint view

牧云@^-^@ 提交于 2019-11-26 16:26:30
Compare Palo Alto with Checkpoint from Checkpoint website based on NSS Labs results: Palo Alto Check Point NSS Labs Results – Protects Against HTML Evasions* 33% 100% NSS Labs Results – Overall Protection** 93% 98% File Sharing Applications 170 531 Total Applications 1,511 4,733 Application Social Network Widgets 0 240,000+ URL Filtering 20 million on box 100 million cloud based Data Loss Prevention 9 file types and regular expression match 532 file types plus file attributes, document templates, dictionaries, keywords and scripting language match Anti-Bot < 1 million protections (signatures/

Understanding GDPR from Security Professional’s Perspective

心不动则不痛 提交于 2019-11-26 16:22:39
One of the most recent and wide-ranging laws impacting the security profession globally is the European Union’s General Data Protection Regulation, or GDPR. As of May 25, 2018, the GDPR is a legal and enforceable act of the European Union. In this post, we will detail the key findings as a security professional how to work to satisfy the requirements of GDPR. General Data Protection Regulation GDPR Chapter 1 – 1 2 3 4 Chapter 2 – 5 6 7 8 9 10 11 Chapter 3 – 12 13 14 15 16 17 18 19 20 21 22 23 Chapter 4 – 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 Chapter 5 – 44 45 46 47 48 49

How do you protect your software from illegal distribution? [closed]

余生颓废 提交于 2019-11-26 14:03:17
I am curious about how do you protect your software against cracking, hacking etc. Do you employ some kind of serial number check? Hardware keys? Do you use any third-party solutions? How do you go about solving licensing issues? (e.g. managing floating licenses) EDIT: I'm not talking any open source, but strictly commercial software distribution... There are many, many, many protections available. The key is: Assessing your target audience, and what they're willing to put up with Understanding your audience's desire to play with no pay Assessing the amount someone is willing to put forth to