Apr 9, 2013
Aaron Hutchens

So far, you have updated your packages and configured your firewall for statefully packet inspection, now we get to the final step. The last, and by no means the least important, step would be some manner of obfuscating your SSH access.  There are a few great ways to do this, many of which far beyond […]

harden-obfuscation
Apr 7, 2013
Andrew Brooks

When it comes to software security testing, fuzzing is both an effective and efficient way to exercise a program’s inputs and outputs.  An introduction on fuzzing techniques and methodologies extends well beyond the scope of this post, so if you’re new to the subject, I highly recommend picking up Fuzzing: Brute Force Vulnerability Discovery and familiarizing yourself […]

Stack Trace
Apr 5, 2013
Dan Ushman

There are over 30,000 web hosting providers in the world, with over 18,000 of them in the United States alone. And that only counts web hosts. That figure doesn’t count other types of providers, such as those who specialize in applications or simply e-mail services – and that’s just today. The competitiveness of the industry continues to […]

partner-centric
Apr 3, 2013
Andy Pace

The big news around here is that we’ve just opened our fourth data center—this one located in Amsterdam. Ahhh! Amsterdam! What a city! It’s called “Venice of the North” for good reason with its 165 canals (about 15 more than Venice) and about 90 islands. Trees and tulips,  and all sorts of other beauties and charms that […]

Venice-of-the-North
Apr 2, 2013
Aaron Hutchens

Last time we discussed updating your packages. Now it’s time to setup your firewall. In this step we are going to install a SPI (Stateful Packet Inspection) Firewall program, CSF. It is worth noting that CSF is by no means the only option, however it offers a robust feature set along with some fantastic management […]

harden-firewall