Security :: Comments Added To Website Have "http://Yourwebsite" - Is It Spam

Jul 26, 2010

On my website/blog I've gotten a couple of comments having what seems to be regular content (name, mail, message), but where the sender website field is set to "http://Yourwebsite". I find it strange that two comments from separate individuals fill the sender website field with this text. Is this possible to find out if these comments are spam or not? Based on the messages alone they don't seem to be, even though it is possible. From what I know the comments code don't enter this value by default.

View 2 Replies


ADVERTISEMENT

Security :: Apache Exploited To Send Out Spam From Mailform On Website?

Oct 7, 2010

I have a server with a couple of sites on it. Some of them have a webform where people can send them emails that they are interested in their work etc. though the "To:" and "From:" adress can't be change by the enduser, you can only enter text and press send. However it seems that someone (not on the server) has found a hole/exploit to use those webforms to send mails to who ever he wants.. I have the webserver setup with ssmtp (simple smtp) and it just forwards the mail sent from the server to my mail-server and there on it sends it out on the internet. If I check my log on the mail-server I can see the whole smtp session, where it's comming from and where it's going etc. I see that it comes from my webserver and over there I only have these log entries:

Oct 6 22:04:47 ettan2 sSMTP[1771]: Sent mail for itaumail@itau.com.br (221 2.0.0 Bye) uid=204 username=torget outbytes=3290

There are loads of those log entries, mostly at after office-hours between 17:00 and 7:00 I have scanned through all the Apache logs and can't find Anything that point to the e-mail addresses used or something like that. The reason I found this out was because he tries to send to a host that doesn't allow connection on port 25 so all the mails got stuck in the queue, over 1000 atm.. I'm using Apache 2.2 and Postfix 2.6 on a Debian Lenny install. What can I do to find out how he's doing this and close the "exploit"? Who would you recommend to setup the mail() thing in PHP for most security?

View 6 Replies View Related

Security :: If Visiting An Https Website Is There Any Added Benefit To Tunneling Through Ssh

Apr 4, 2011

Basically, whenever I am on an unencrypted wireless hotspot, I open up an SSH tunnel to my home server to do all my browsing for the privacy and security it provides.But I got to thinking, and now I am curious, if I am visiting a site like gmail for instance that always uses SSL/TLS for it's connections, is there any added benefit to also using an encrypted tunnel? or is it perhaps superfluous to use both

View 3 Replies View Related

OpenSUSE :: Why Does Konqueror Need Every Website To Start With Http

Mar 9, 2010

I've grown accustomed to using konqueror, and i like it's speed. Firefox on kde is slightly sluggish and consumes much more memory.If i type a website address in konqueror, for example, Google, it comes up with an error message. It expects me to put in Google.Is there any way to make this default in konqueror? For example, in firefox i just type in google or Google.

View 9 Replies View Related

Ubuntu Security :: Is My Machine Being Used For Spam

Dec 26, 2010

When i run

Code:

I sometimes see

Code:

So i'm wondering if this means my ubuntu server box is being used for spam or something? There are no other (human) users on the computer and i don't use it to send mails.

I've run

Code:

In paranoia, but still when i run

Code:

I get

Code:

And sometimes

Code:

Just thought i should ask before starting the tedious process of reinstalling and restoring the system.

View 2 Replies View Related

Security :: Ip Is Blocked For Sending Spam

Nov 18, 2010

We have a spam in our network and we installed antivirus in all our systems and cleaned the virus from all pc's after that i had removed my ip from the database of blocked ip's but still my ip is blocked for sending spam i don't know from which pc the spam is going on the internet.

so i have a question that my proxy server is redhat linux and as a newbie i don't know the command's to find out which pc is creating large bandwidth to the internet. If you tell the command how to see which pc is sending spam then i will discard that pc. Also i want a strong firewall to stop spam activities.

View 6 Replies View Related

Ubuntu Security :: IM Spam From Genuine Contacts

Mar 8, 2010

I, as many here, have friends on different IM accounts (and btw, so great that we have pidgin and empathy and not have to deal with 3 different softwares to talk to them) and of all that I have... which are not so many... one of them sends me spam, not all the time, but it happens and I kind of feel sorry for her so I'd like to see if there's a way for her to retake control of her account or if she can't do anything at all with it.

I have other friends in MSN but I get spam only from her and she's given up on how to fix it cause she doesnt know how to. I did a search (and keep looking for more in the web) and so far it doenst look promising (but is also because I dont know what else to do). The problem is I get messages which I know for sure are spam, cause her english is more limited and the messages are very polished in that regard.

I got this from another discussion elsewhere: "troutbot = These bots get your IM from scraping the Internet screenname and connect you randomly to someone else. While you're talking to the troutbot, they're just an intermediary connecting you to some other guy who also had his IM scraped." So far the times I get spam... the other side never answers, but if my friend is online she can. I thought that on these IM services... if you are logged in nobody else can log in with your username/password...

View 4 Replies View Related

Security :: Spam Filter Software For ISP Environment.

Jan 24, 2011

We operate a small ISP and are currently using a debian distro as our gateway server.Recently we have had an increased number of spam issues with customers (not them sending it directly, rather the customer getting infected with a virus/malware and then their computer becoming a bot).I'd like to set up another gateway of sorts to sit after our authentication gateway but before our backbone to provide spam filtering (and hopefully virus filtering) for any traffic passing through which might be email.I've tried searching for any linux based software which would suit, but I'm coming up empty.

Surely there's something already out there which can perform this task.Finally, just to clarify, I'm not talking about spam filtering for email accounts we host ourselves (this is built into our mail server); I'm talking about spam originating from customers PC's which is passing through our gateway (but not our mail server).

View 1 Replies View Related

Ubuntu Security :: Spam Received From Own Hotmail Account

May 3, 2010

After reading everything that says you don't need an anti-virus for Linux. OR Linux doesn't get viruses. Guess what I have a Virus. I don't know which one, but it is sending out spam emails from my webmail, MSN, account. I do not have a local client installed. I am guessing it is linking into MSN through Pidgin, getting the addresses there, and sending the spam, somehow, through MSN. Actually one MSN and one Hotmail account. I also have not been able to find an anti-virus program for Ubuntu. There do not seem to be any listed in the software repositories that Ubuntu links into. How do I get rid of it? My contacts are starting to get upset.

View 9 Replies View Related

Security :: Lots Of CRON Spam From Root. Normal?

Jan 25, 2010

Take a peek at this:

Code:
Jan 23 20:15:01 localhost CRON[22629]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 23 20:15:01 localhost CRON[22629]: pam_unix(cron:session): session closed for user root

[code]....

View 3 Replies View Related

Server :: Sending Spam To The Spam Folder?

Apr 30, 2009

I just setup SpamAssassin and what not following this tutorial

[URL]

I am using CentOS 5.3. I was half way through that and got an email that had ***SPAM*** in the subject. Haven't received any more. First of all I want to know if spam will still get delivered, and just have a modified subject. Second, I want to know how to set it up so Spam goes to a user's spam mailbox (Virtual Users). And third of all, is it possible to disable spam filtering on a user basis, preferably using MySQL tables? Is it possible for users to mark a message as spam, and all further messages sent from that address will be sent to spam folder but only for that user?

EDIT: Yes spam is getting delivered with a modified header, on the server site, how can i deliver to spam folder? how to create IMAP virtual mailboxes on request without having to send an email to them first? Using virtual users with Courier Imap

View 3 Replies View Related

Ubuntu Security :: Basics Of Good Security Of Small Commercial Website?

Jan 17, 2011

1. I understand you can protect your files or directories in your website by setting file/directory permissions. The meaning of r w x is clear to me, but I'm not sure how to proceed... Starting with the index.html file, if I wanted to make it so that anyone in the world can read it but can't modify it, do I set its permissions to rwxr-xr-x? If I set it to rwxr--r--, would that mean the file couldn't be served? I mean, what does the x setting do on a .html file, how can a .html file be executable?

2. If file permissions work on the lines of owner-group-others, in the context of a website, who is 'group'? As far as I can tell, there's only the owner, which is me, and others, which is the world accessing the site. Am I correct in thinking that by default, say when creating a website on a shared hosting server, there is no group unless I specifically set one up?

3. My ISP allows the DynDNS.org service, meaning that I could serve a website from my home. It's too early to go that route just yet, but for future reference, I would like to ask about the server software called Hiawatha. It is said to be secure, but having read some evaluations of it, it doesn't seem to offer anything that couldn't be accomplished with Apache or Cherokee, it's just that its security settings are simpler and easier to configure. Am I right about this? Or does Hiawatha truly offer something that the other major server packages don't?

View 9 Replies View Related

Ubuntu Security :: Add Smtp Authentication To Postfix Installation Used As Spam Filter For Exhange Server

Feb 26, 2010

I followed this How To (https://help.ubuntu.com/community/Postfix) in order to add smtp authentication to my Postfix installation used as spam filter for my exhange server, and it'seem all ok; the only thing that I don't understand is where I list all the users (with passwords) that I authorize to send mail through my server...

View 3 Replies View Related

Server :: Forwarding Spam To A Spam Box?

Aug 25, 2009

I currently have the following email server set up:

Postfix with mysql backend
Dovecot
clamav
spamassassin
amavisd

And it all works great. However I would like it for amavisd to forward all the marked spam into a folder on each user account, but I cannot figure this out.

View 5 Replies View Related

Fedora :: Getting Smart Card Reader Added As Security Device In Firefox?

Jun 10, 2009

Anyone running fedora 11 have any luck getting a smart card reader added as a security device under firefox?
Specifically from firefox: Edit-Preferences-Advanced-Encryption tab-Security_Devices-Load;
Enter arbitrary name and "/usr/lib64/libcoolkeypk11.so" as the module.

This worked fine in fedora10 and was the necessary step to getting a card reader to work with firefox. In fedora11 (with firefox beta) the browser just comes back with nothing, it doesn't even respond. Note I am familiar with the concept of pki and certificates as well as certutil, pkcs11_inspect, pklogin_finder, etc. Also note utlities like pkcs11_inspect and pklogin_finder and esc all work and communicate with the reader and read the contents of the card but smart card login configured via the authentication applet (as working in fedora 10) is not working either.

View 3 Replies View Related

Ubuntu Security :: Added User To Www-data Group, But Still Can't Edit Directory With 775?

Jan 4, 2010

I'm working in Ubuntu 9.04 Desktop with Apache installed. I have a directory /var/www/test:drwxrwxr-x 5 root www-data 4096 2010-01-04 13:51 test And I've added myself as a member of the group www-data. Problem though is when i go into /var/www/test I still can't do anything, whether it's creating a new file or directory or editing files there. The files within the directory are also 775 and setup under group www-data.

View 2 Replies View Related

Security :: Created A .htaccess File In The Folder And Added AuthType Basic?

Jan 26, 2010

I have a folder on my server i want to protect with http authentication but i have problem. i created a password htpasswd -c .htpasswd razzera

then i created a .htaccess file in the folder and added
AuthType Basic
AuthName "Restricted Files"
# (Following line optional)
AuthBasicProvider file
AuthUserFile /.htpasswd
Require user razzera

but when i go tho the folder it wont request any login details. why ??

View 6 Replies View Related

Networking :: How To Use Security HTTP Proxy

Sep 19, 2010

I have a http proxy account. It works well under windows through wodTunnel(an active X control component). But, I usually works under linux. I want to use it here. But I don't know how. I tried gstm, it can connect to the server successfully, but it seems can't respond to my http request. What should I do next?

View 3 Replies View Related

Security :: Red Hat SeLinux Is Blocking Ssh And Http?

Feb 3, 2011

When I turn on my SeLinux to enforcing mode on my Red Hat system ssh stops working and my http server stops responding.

I went into the SeLinux GUI and enabled things in there but still it wont work.

Any thoughts on what to check?

permissive mode and disabled they work

I read several articles that say it should not be affect by SeLinux and the setting look correct but the only thing I do is turn on SeLinux and ssh /httpd stop working

ps -eZ | grep sshd
system_u:system_r:unconfined_t:SystemLow-SystemHigh 432 ? 00:00:00 sshd
system_u:system_r:unconfined_t:SystemLow-SystemHigh 2426 ? 00:00:00 sshd
[root@goxsa1340 ~]# ps -eZ | grep httpd
user_u:system_r:httpd_t 3044 ? 00:00:00 httpd

[Code].....

View 11 Replies View Related

Security :: Seeing The Ips With Many Connection On Website?

Nov 1, 2010

on my linux server i have many websites, before i use this command

netstat -anpl|grep :80|awk {'print $5'}|cut -d":" -f1|sort|uniq -c|sort -n

to see all the ips with many connection but the problem is is show me all the ips from all the websites from the server, can be another way to show me all the ips just from my website ?

View 1 Replies View Related

Ubuntu Security :: Ettercap Can See Http Request But Not Response

Nov 8, 2010

ettercap can see http request but not response

I'm trying to see regular http responses from my wireless ipad (victim) from my wired pc (attacker). Everything's working great but I can only see the http requests not the responses.

I've done much reading and googling and tried registering in more relevant forums but some forums were shutdown, so I've come here.

Code:
# setup ip forwarding
echo 1 | sudo tee /proc/sys/net/ipv4/ip_forward
# use ettercap to do the mitm using only mitm
sudo ettercap --iface eth0 --text --plugin autoadd --only-mitm --mitm arp:remote /192.168.0.1/ /192.168.0.155/

[Code]....

View 2 Replies View Related

Security :: BigBlueButton - From HTTP To HTTPS Reverse Proxy

Sep 17, 2010

I am working on a project to create a video conferencing environment. For this I use a default installation of BigBlueButton on ubuntu 10.04. One of the main problems here is that it's not safe enough to share classified documents trough this software. It's a simple webserver that uses nginx. What I want to do is make this connection secure.

One of the problems is that I don't only have a connection trough port 80 but it uses the following ports:
Port 80 (HTTP), 1935 (RTMP), 9123 (Desktop sharing).
I would like to use a proxy instead of some tunneling or vpn to do this. Would anyone happen to know anything about squid or another equivalent to do this?

View 3 Replies View Related

Security :: Bypass Proxy By Encrypted HTTP Access

Aug 30, 2010

My company web access is behind proxy(http://abc.proxy). Network admin can get to check who is top10 user and web they access. I owned a centos server. I have a thought that create an encrypted tunnel within proxy so the admin cant detect my http address. This is how it going to works

client with OpenVPN -> OpenVPN server(centos with company proxy)-> proxy -> internet

My connectivity in my client are using OpenVPN server as bridge. Hence, no record for client is recorded in my Network admin monitoring list. OpenVPN server's activity can be traced by network monitoring tools, just assume that our ultimate goal is to hide client activity.

View 2 Replies View Related

Security :: THC Hydra And HTTP Brute-force Cracking?

Mar 29, 2011

I set up an ASUS WL-500gP with original ASUS firmware to my LAN with IP address 192.168.1.1. If I navigate to address [URL] in my Firefox address bar, an Authentication required window opens up asking for "User name: " and "Password: ". Correct "User name: " is "admin" and correct "Password: " is "pA55w0Rd". They work fine if I type them in manually to the Authentication required window, but for some reason I can't get in using the hydra with words.txt password file, which contains "pA55w0Rd":

Code:

[root@ ~]# cat words.txt
password
user
pA55w0Rd

[code]....

View 2 Replies View Related

Ubuntu Security :: How Secure Can Website Really Be

May 25, 2011

I want to set up a website that hosts very confidential business information. The info needs to be accessed by multiple people in different geographical regions. The entire website would require the high security (ie: there are no little sections that are publicly viewable). While the site will be run with Ubuntu server, I will be hosting it in Amazon's EC2 cloud.

So, if I use the HTTPS protocol with an SSL certificate, am I pretty well reaching the most secure possible situation? Are there any concerns with using the EC2 solution? Obviously there are a LOT of variables involved with maintaining website security, but I want to know if HTTPS is the current best bet (in addition to all the "best practices" of securing a site) or if there is a more robust way of securing content.

View 9 Replies View Related

Fedora Security :: Iptables Masquerade, Can Ping But No Http Access?

Dec 13, 2009

I've got two routers, 10.0.0.0/23 and 192.168.2.0/24, which are joined by a Linux box with interfaces eth0 (10.0.0.2) and ra0 (192.168.2.2). I've got masquerading for ra0, and a route to 192.168.2.0/24 on 10.0.0.0's router. I CAN ping hosts on 192.168.2.0 from 10.0.0.0 just fine, but I CANNOT access web pages.Strangely, If I enable masquerading on eth0, and add a route to 192.168.2.0s router to 10.0.0.0, I can ping AND access web pages from 192.168.2.0Here is my current iptables

Code:
*filter
:INPUT ACCEPT [0:0]

[code]...

View 14 Replies View Related

Security :: Limit Incoming HTTP Bandwidth Usage With IPtables

Apr 5, 2011

Can I, with only the use of IPTABLES, limit the incoming bandwith for a protocol? We have for example servers that have a FTP and HTTP server running and whenever HTTP has a lot of connections open, the other uploads/downloads get a timeout. I know I can limit the number of connections but prefer to limit on protocol level. Is this possible using IPTABLES and if so, can someone indicate how to proceed or provide a link? If it's not possible can someone point me to the right tool for the job?

View 6 Replies View Related

Ubuntu Security :: Logging Into The Secure Website?

Oct 8, 2010

A friend of mine has a private forum setup so he and I can communicate back and forth so we don't have to send emails. The link is a "https://" so I'm assuming it's secure. I'm a newbie to ubuntu and I have already switch 3 of my computers at home to ubuntu.

I'm using Ubuntu 10.04 and google chrome as my browser. When I log into his forum it pops up with a screen saying "The site's security certificate is not trusted" and I always click proceed anyways. I'm not worried about this because I'm 110% sure that it's his website that I'm trying to access. My question/problem is it also pops up with a little box telling me to enter my Username and Password every time. When I was using WindowsXP, I had to enter this info once and then I wouldn't have to enter it again.

View 4 Replies View Related

Ubuntu Security :: What Data Does Website Log When Pc Visits It

Feb 27, 2011

For example would a website log the mac address of my ethernet adapter and my computer name?

View 4 Replies View Related

Ubuntu Security :: Alternative Way For Website Encryption?

Jul 17, 2011

I don't care for domain 'authentication' by an "Authority". I don't trust no one, so CA's to me are as trustworthy as the gypsy in the park.

I can use a self-signed certificate, but the problem is most browsers makers are Fn idiots that say the connection is not secure, when it actually it, but because I did not folk out cash, it makes my website look bad.
I can understand the need for a 3rd party to verify the domain host to prevent man in the middle attacks, but I do not care for this.. and browser makers should take more responsibility and introduce different padlocks for types of authentication, rather than saying "this connection is encrypted, but not secure because its self-signed". What a load of horse s***!

How many times does people stop to read certificate authorities? I sure don't. I only care weather or not the connection has been encrypted.. so, I am looking for a way for simply providing encryption for my website.

From what I understand, when you submit a CSR to a CA, it includes the private key, meaning that the CA would be able to see the encrypt data, should they get hold of it. This is not acceptable for me.

Is there anything other way to use encryption other than the SSL model that is used typically amongst HTTPS browsers today?

View 3 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved