Best practices for securing Apache Web servers

Web Server Threats and Countermeasures

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Screencast: How to use Wikto for Web server assessment

    Peter Giannoulis demonstrates what kinds of website and Web server information can be found using the free Wikto tool. 

  • IT discussion: Is malware the cause of a DNS server error?

    DNS connectivity problems are quite common, but an increasing number of DNS issues are being caused by surreptitious attacks. In this Q&A thread from SearchSecurity.com's redesigned IT Knowledge Exchange, learn how an innocent query about a finicky D... 

  • Finding and blocking Web application server attack vectors

    Web application server attacks are nothing new, but attackers are coming up with creative new ways to penetrate them. Information security expert Peter Giannoulis examines how data-hungry attackers are using Web application servers to crack into back... 

  • Avoiding the scourge of DNS amplification attacks

    DNS amplification attacks can generate enough bogus traffic to blow almost anyone off the Internet. Learn how these packet flood attacks work and how to defend your organization. 

  • Blocking Web anonymizers in the enterprise

    As Internet privacy concerns continue to proliferate, so does the use of Web anonymizers. While these tools can help you block employee access to certain Web sites, they are also beneficial in helping employees evade your efforts. In this tip, access... 

  • IIS security: Configure Web server permissions for better access control

    Updating user access controls as business portfolios expand can help protect confidential data. Learn how to secure user access controls and keep your greatest asset under lock and key by configuring IIS Web server permissions, in this tip by SearchS... 

  • Blocking online music access

    While letting employees listen to music online may seem like a harmless way to boost morale, streaming audio drains network bandwidth. In this tip, your peers offer advice, tools and tactics you can use to protect your T1 and prevent users from acces... 

  • RSS: The next malware target?

    A recent report from Trend Micro names RSS as the next likely target for bot worm attacks and predicts feed hijackings will be prevalent with the release of IE 7. In this tip, security expert Mike Chapple explains how RSS could be exploited, and offe... 

  • Seven trends to expect from virus and worm authors in 2006

    This threat monitor tip outlines seven emerging trends among virus and worm writers, explains why it is important to implement enterprise-wide security measures and provides tools and tactics to defend against them. 

  • Best practices for managing secure Web server configurations

    In this tip, Michael Cobb, our Web security guru takes an in-depth look at ways to manage securing configurations of multiple Web servers. He explains the process from frequency to documentation and replication.