Found 9 results for security  
Client certificates are, as the name indicates, installed on the client - that is the web browser - and transferred to the server when the server requests them and the user agrees to send it. The client certificate itself is sent to the server, ...
 1332    43     Monday, June 6, 2011    # PHP # security # SSL
You've come to the right place if you are looking to acquire mad skills for using .htaccess files. Htaccess allows for decentralized management of Web Server configurations which makes life very easy for web hosting companies and especially ...
 832    27     Tuesday, March 20, 2012    # Apache # htaccess # security
Created as a resource to protect servers, systems and web sites from spam, malware, cross-site scripting, website hijacking, hacking, cracking and other malicious activities.
 855    22     Friday, November 25, 2011    # security # IP # htaccess
Netfilter is a host-based firewall for Linux operating systems. It is included as part of the Linux distribution and is activated by default. This firewall is controlled by the program called iptables. Netfilter filtering takes place at the kernel.
 1741    15     Wednesday, June 29, 2011    # firewall # security # Linux
The microblogging site adds a new security measure designed to make it harder for organizations like the National Security Agency to uncover its data.
 521    15     Tuesday, November 26, 2013    # privacy # security # Twitter
Tips and tricks for securing Apache Web servers using htaccess, httpd.conf, and other built-in techniques to thwart attackers. This really should be required reading for any Apache admin or user because these little tricks are so easy.
 1121    14     Tuesday, February 1, 2011    # Apache # htaccess # security
A Microsoft ActiveX control is essentially a simple OLE object that supports the IUnknown interface. This section offers solutions for making a control work well in the Internet environment, with the ultimate goal of delivering optimal quality of ...
 698    11     Thursday, November 10, 2011    # ActiveX # security
Covers using IPTABLES with the 2.4 Linux kernel. If you created the proxy server, all you have to do is add a few more IPTABLES commands to enhance the firewalling functionality of the system.
 964    10     Wednesday, June 29, 2011    # firewall # security # Debian
Answers to some common questions about firewalls.
 932    9     Wednesday, June 29, 2011    # firewall # security