Best practices for securing Apache Web servers

Web Server Threats and Countermeasures

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Blocking online music access

    While letting employees listen to music online may seem like a harmless way to boost morale, streaming audio drains network bandwidth. In this tip, your peers offer advice, tools and tactics you can use to protect your T1 and prevent users from acces... 

  • Security Wire Weekly: Sourcefire update, new Symantec report, bruised Apple and infosec pros unstain

    This week's podcast features Forrester's Paul Stamp on Check Point's beleaguered Sourcefire acquisition, plus details on a new Symantec report, Apple's latest black eye and why BlackBerry never squeezed security pros. Listen on your PC or download to... 

  • Proof-of-concepts heighten mobile malware fears

    By themselves, Crossover and RedBrowser are fairly harmless, but they're a sign that the digital underground is likely working toward large-scale attacks against handheld devices. 

  • Security Wire Weekly audio downloads

    Get the week's top information security news while you're commuting to work or at the gym -- whenever it's convenient to you! Listen to our Security Wire Weekly audio downloads by SearchSecurity's award-winning news team and stay in the know. 

  • Review: Lucid Security's ipAngel far beyond standard IPS fare

    ipAngel is a cleverly integrated package that will help stop exploits at your perimeter and assess the security of your network. 

  • Review: StoneGate SG-4000 'hard to beat'

    HOTPICK: Stonesoft's StoneGate SG-4000 network firewall's high availability, scalability and low maintenance requirements offer significant value. 

  • Best practices and tools for non-MS IIS users

    Learn what best practices and tools non-MS IIS users can use in this application security Ask the Expert Q&A. 

  • Mozilla issues Firefox mega-fix

    The digital underground could exploit as many as seven flaws to bypass security restrictions, compromise sensitive data and launch cross-site scripting attacks. 

  • Mapping Windows client certificates

    In this Ask the Expert Q&A, Michael Cobb explains how to properly map Windows client certificates to access a Web site. 

  • Microsoft confirms Windows Wi-Fi flaw

    However, until a rollup patch is released, the software giant said Tuesday that users can take basic steps to protect themselves from the Windows wireless vulnerability.