Configure web service security using htaccess

The Apache Web server has a variety of configuration options for administrators. The problem is, when you have hosting, you don’t have access to the apache configuration. As a result you cannot make changes to settings and are forced to use the default configuration. One alternative that can be done to overriding the default configuration is to do the settings via the .htaccess file. The .htaccess file is an ASCII file placed in the www directory or www subdirectory....

June 8, 2015 · 1 min · Rizal Asrul Pambudi

Configuring web services security (SSL/TLS) using OpenSSL

Transport Layer Security (TLS) adalah protokol untuk mengamankan komunikasi antar aplikasi lewat internet. TLS mengamankan konten pada layer aplikasi, seperti halaman web dan diimplementasikan pada layer transport, yaitu TCP. Untuk menjamin keamanan, data yang dikirim dienkripsi dan diotentikasi pada sisi server dan client. Secure Socket Layer (SSL) adalah protocol yang diciptakan sebelum TLS yang mengaplikasikan hal ini. SSL/TLS is usually operated together with HTTP, thus forming a new protocol called HTTPS, to secure transactions over the web....

June 5, 2015 · 1 min · Rizal Asrul Pambudi

Configure proxy service security

Proxies are generally used to provide caching services to the local network using the Squid cache. Proxy clients do not need to directly access the web page they are going to, but simply by retrieving them in the server cache (proxy). The way it works is that when a client accesses a web address, Squid will store the web page files in the proxy’s local cache and then give it back to the client who accesses the same web page, when a client accesses the same web page....

May 30, 2015 · 2 min · Rizal Asrul Pambudi

Detect intrusion in system using snort

Intrusion detection is an activity to detect an intrusion quickly by using a special automatic program. The program used is usually called the Intrusion Detection System (IDS). Previously we have reviewed about host-based IDS here. The basic types of IDS are: Rule-based system – based on a database of known insertion marks or attacks. If the IDS records traffic that matches the existing database, it is immediately categorized as an intrusion....

May 30, 2015 · 1 min · Rizal Asrul Pambudi

Firewall configuration using iptables

A firewall is a system or group of systems that establishes access control policies between two networks. In principle, a firewall can be thought of as a pair of mechanisms: the first blocks network traffic, the second allows network traffic. A firewall can be used to protect a network from external attacks, but a firewall cannot protect against attacks that don’t go through the firewall and attacks from someone on the same network, and a firewall cannot protect a network from poorly written application programs....

May 30, 2015 · 1 min · Rizal Asrul Pambudi