security

IP Blocking URLs on Apache

久未见 提交于 2020-01-05 04:57:06
问题 I need to block access to my entire site via IP Address except the url /api which should be open to all. I am currently using ... <LocationMatch /admin> Order Deny,Allow Deny from all Allow from [MY IP] </LocationMatch> this blocks access urls starting with /admin. But I want to block all urls except the ones that start /api. Chris 回答1: RewriteEngine On # (only needs to happen once in .htaccess files. RewriteBase / RewriteCond %{REMOTE_ADDR} !^10\.103\.18\.104 # <--YOUR IP HERE RewriteCond %

Docker security concerns using unofficial images

主宰稳场 提交于 2020-01-05 04:27:28
问题 How to ensure, that docker container will be secure, especially when using third party containers or base images? Is it correct, when using base image, it may initiate any services or mount arbitrary partitions of host filesystem under the hood, and potentially send sensitive data to attacker? So if I use third party container, which Dockerfile proves the container to be safe, should I traverse the whole linked list of base images (potentially very long) to ensure the container is actually

Javascript Calling a Rest API with App Name and App Password - How Can i Secure it

柔情痞子 提交于 2020-01-05 02:23:06
问题 I am sure this Question has been asked a lot of time. But wanted re-confirm my doubt and get some tips. i was planning to play around with buddy.com back end as a service. and i saw that most of their REST API requires App Name and Password to be embedded if you are using JavaScript. They don't have any documentation for javascript, yet. But was wondering if i have to start using it right now from Javascript using normal html or HTML5 web app. how do i use it. i don't want to pass App

Process uploaded animated gif for security

谁都会走 提交于 2020-01-04 15:14:54
问题 We are working on a website to allow animated GIF upload. To ensure the image is indeed an image and without malware/virus/backdoor/trojan or anything other than image data itself, we try to recreate the original image. However, the process itself will take sometime when there are lots of frames inside. Is there any other way to ensure an uploaded animated GIF file is free from the issues mentioned above? 回答1: You can never 100% guarantee that a file does not contain malware - even with your

Only allowing certain websites access PHP API

删除回忆录丶 提交于 2020-01-04 14:48:29
问题 I am currently facing the problem of securing up an API my clients use on their websites. However because this API is called by JavaScript I'm finding it hard to figure out a way to only allow these access the API/URL's. So how would I go about this? How would I only allow access to these links. Obviously the links could be compromised but I would like to have a way to deny the script from operating if it hasn't come from an verified site. ATM all I can think of using is the Referrer header

SQL Server row level security - many to many

二次信任 提交于 2020-01-04 14:33:37
问题 We are using SQL Server 2008 and have our permissions setup in Active Directory (AD). Each row in a core table needs to be only viewable by those that have permission to view each row. I can setup row level security on each row (each row contains a single role that lines up with an AD group), however I have the following problem :- because the roles represent countries I have several 100 roles. Further I have some users who have access to several roles...and the several roles given users have

What does “no collisions have been found yet for this hashing method” even mean?

╄→尐↘猪︶ㄣ 提交于 2020-01-04 14:21:10
问题 I mean I don't need to look for the actual collisions, to know they exist. If there weren't collisions, then how would you have fixed-length results? That's why I don't understand what people mean when they claim 'md5 is insecure! someone found collisions!', or something like that. The only thing I can think of, is that the collision search only looks for dictionary words, eg: If 'dog' and 'house' share the same hash, it would be a stupid hashing method IMO. It could also look for strings

What does “no collisions have been found yet for this hashing method” even mean?

我与影子孤独终老i 提交于 2020-01-04 14:21:07
问题 I mean I don't need to look for the actual collisions, to know they exist. If there weren't collisions, then how would you have fixed-length results? That's why I don't understand what people mean when they claim 'md5 is insecure! someone found collisions!', or something like that. The only thing I can think of, is that the collision search only looks for dictionary words, eg: If 'dog' and 'house' share the same hash, it would be a stupid hashing method IMO. It could also look for strings

Password hashing - Industry Standards

爷,独闯天下 提交于 2020-01-04 13:59:50
问题 I know there are probably a lot of questions like this already. But, I really haven't found the definite answer for my question. I know that passwords are stored in the database with a prepended random salt followed by the hashed password. The value of the password is actually never known (by the server and thus the server admins). What is the standard hashing algorithm ? I know cryptography is a dynamic field and changes with time. So I'm asking what's the current industry standard for

Setting Folder permissions on Vista

半世苍凉 提交于 2020-01-04 13:58:31
问题 I am trying to set the permissions of a folder and all of it's children on a vista computer. The code I have so far is this. public static void SetPermissions(string dir) { DirectoryInfo info = new DirectoryInfo(dir); DirectorySecurity ds = info.GetAccessControl(); ds.AddAccessRule(new FileSystemAccessRule(@"BUILTIN\Users", FileSystemRights.FullControl, InheritanceFlags.ContainerInherit, PropagationFlags.None, AccessControlType.Allow)); info.SetAccessControl(ds); } However it's not working as