Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How is the safelogic.com made secure?

Secure
0
10 Posted

How is the safelogic.com made secure?

0
10

Firstly, we should bear in mind that the specialists frown upon attempting to create a secure computer system by means of “secrets” or “fuzziness”. This means that there is no real risk in divulging a Web configuration, all the more so since there are numerous Web tools and services to identify most elements; IP address, OS, Web server and so on. safelogic.com runs on a dedicated Dell server with an Intel processor operating under Linux with RedHat 6.0 distribution and a Web Apache 1.3.6 server. The first step in server securement is to remove all pointless and “dangerous” services: Telnet, rlogin, rsh, uucp, tftp, ftp, rcp, sendmail, mail, talk, etc. This leaves only the ports 22 (SSH) and 80 (HTTP). SSH (Secure Shell) is used to set up a coded link between the client and the server. SSH replaces Telnet which routes unscrambled data, including the connection password. A network analyzer (tcpdump) has been installed as has a firewall to trace attempted attacks. And, course, we use Last

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123