There's a sure-fire method to protect any kind of server that supports anonymous user access -- which means that this tip applies to FTP and other anonymous services, as well as Web servers that permit anonymous access. In such cases, the safest course of action is to isolate file system containers where anonymous access is permitted from containers where more stringent access controls apply.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Ed Tittel is a principal at a content development company based in Austin, Texas, and the creator of the Exam Cram series. He has worked on numerous certification titles on Microsoft, Novell, CIW and Sun related topics; he's working on several security certification books in 2002 (ICSA, CISSP and more). As an expert on searchSecurity, Ed answers your questions on infosec certification and training.