How is the safelogic.com made secure?
Firstly, we should bear in mind that the specialists frown upon attempting to create a secure computer system by means of “secrets” or “fuzziness”. This means that there is no real risk in divulging a Web configuration, all the more so since there are numerous Web tools and services to identify most elements; IP address, OS, Web server and so on. safelogic.com runs on a dedicated Dell server with an Intel processor operating under Linux with RedHat 6.0 distribution and a Web Apache 1.3.6 server. The first step in server securement is to remove all pointless and “dangerous” services: Telnet, rlogin, rsh, uucp, tftp, ftp, rcp, sendmail, mail, talk, etc. This leaves only the ports 22 (SSH) and 80 (HTTP). SSH (Secure Shell) is used to set up a coded link between the client and the server. SSH replaces Telnet which routes unscrambled data, including the connection password. A network analyzer (tcpdump) has been installed as has a firewall to trace attempted attacks. And, course, we use Last