容器安全之镜像扫描 - 自由早晚乱余生 - 博客园
容器安全之镜像扫描 - 自由早晚乱余生 - 博客园
本文介绍了容器镜像扫描的两种工具:docker scan和Trivy。docker scan是docker官方推出的插件,需要登录dockerhub用户才能使用,免费扫描限制为10次/月。Trivy是一个全面且多功能的安全扫描仪,支持多种扫描场景和平台。文章还提到了镜像扫描的几种应用场景,并介绍了ImagePolicyWebhook容器镜像扫描的实现方式。
服务器入侵之找出隐藏字符的原理 - 自由早晚乱余生 - 博客园
服务器入侵之找出隐藏字符的原理 - 自由早晚乱余生 - 博客园
本文介绍了在服务器入侵过程中发现隐藏字符的原理。通过使用命令如cat -A,可以查看隐藏字符,其中包括转换为\\r的^M字符,它表示回车并可能导致内容覆盖。文章提供了示例和注意事项,并给出了参考文章和作者信息。
5 Best Open Source SIEM Tools | Mezmo
5 Best Open Source SIEM Tools | Mezmo
This post discusses the 5 best open-source SIEM tools for organizations looking to mitigate cybersecurity risks and detect threats. The featured SIEM solutions include AlienVault OSSIM, MozDef, Wazuh, Prelude OSS, and Sagan, each with its own unique features and advantages. The post emphasizes the importance of finding a SIEM that suits specific needs and offers effective threat detection capabilities.
一次被入侵和删除木马程序的经历-阿里云开发者社区
一次被入侵和删除木马程序的经历-阿里云开发者社区
该文章描述了作者在一次被入侵和删除木马程序的经历。作者首先发现服务器流量异常增高,经过一系列的分析和操作,最终成功清理了木马程序并加强了服务器的安全性。
一次服务器被入侵的处理过程分享 - 自由早晚乱余生 - 博客园
一次服务器被入侵的处理过程分享 - 自由早晚乱余生 - 博客园
这篇博客分享了一次服务器被入侵的处理过程和一些启示。处理措施包括删除恶意文件、解锁文件和目录、还原被篡改的命令、清空异常文件内容等。启示包括加强安全组设置、增加密码复杂性、监控关键文件、限制登录IP、关闭外网、检查异常进程和定时任务等。
Create and host a tunnel - Microsoft dev tunnels | Microsoft Learn
Create and host a tunnel - Microsoft dev tunnels | Microsoft Learn
Learn how to create and host a dev tunnel using Microsoft's devtunnel CLI tool. This article provides step-by-step instructions for installing the CLI on different operating systems, logging in, hosting a dev tunnel, and connecting to it. With dev tunnels, you can securely test and debug web apps and webhooks from anywhere.
Automated Alerts on Azure (Entra ID) Application Secret Expirations - The Lazy Administrator
Automated Alerts on Azure (Entra ID) Application Secret Expirations - The Lazy Administrator
This article provides a guide on using Azure to automate alerts for Azure (Entra ID) application secret expirations. It covers creating a new Azure application, assigning permissions, creating an app secret, connecting to the Microsoft Graph API, retrieving application information, handling pagination, getting application secret expiration, converting time to local time zone, dealing with multiple secrets per application, sending alerts via email and Microsoft Teams, and setting up automatic serverless automation using PowerShell runbooks and schedules.
微软免费开发隧道(内网穿透),支持Linux/Windows/macOS - 如有乐享
微软免费开发隧道(内网穿透),支持Linux/Windows/macOS - 如有乐享
本文介绍了微软免费开发隧道(内网穿透)的使用教程和命令说明。通过该工具,可以在Linux、Windows和macOS上实现内网穿透,并提供了详细的命令示例和高级用法说明。文章还介绍了使用限制和管理开发隧道的方法。
Build DMZ in Azure Cloud | Blog by Raihan Al-Beruni
Build DMZ in Azure Cloud | Blog by Raihan Al-Beruni
This blog post discusses how to build a DMZ (Demilitarized Zone) in Azure Cloud. It explains the concept of a DMZ, the architecture with two or three layers of security, and workload placement. It also provides examples of address spacing and hybrid network workloads placement. The post concludes with best practices for Azure networking, including segmenting networks, controlling traffic with NSGs, and enforcing user-defined rules.
Best practices for network security - Microsoft Azure | Microsoft Learn
Best practices for network security - Microsoft Azure | Microsoft Learn
This document provides best practices for network security in Microsoft Azure. It emphasizes the importance of adopting Zero Trust architectures, implementing conditional access policies, enabling port access only after workflow approval, and granting temporary permissions for privileged tasks. The document also recommends controlling routing behavior, using virtual network appliances, deploying perimeter networks for security zones, avoiding exposure to the internet with dedicated WAN links, optimizing uptime and performance with load balancing, disabling RDP/SSH access to virtual machines, and securing critical Azure service resources with Azure Private Link. Additional information on control routing behavior, virtual network appliances, perimeter networks, WAN links, load balancing, RDP/SSH access, and Azure Private Link is provided. The document concludes with a reference to Azure security best practices and patterns.
Greenbone Community Containers 22.4 - Greenbone Community Documentation
Greenbone Community Containers 22.4 - Greenbone Community Documentation
This document provides instructions for using Greenbone Community Containers 22.4. It includes steps for starting the vulnerability management, setting up and starting the containers, updating the containers, performing a feed synchronization, accessing the web interface remotely, gaining terminal access to a container, using gvm-tools for CLI access, setting up a mail transport agent, performing a manual feed sync, troubleshooting common issues, and more.
How To Setup A L2TP/SSTP Client Access RRaS Server In Azure ~ Bauer-Power Media
How To Setup A L2TP/SSTP Client Access RRaS Server In Azure ~ Bauer-Power Media
This post explains how to set up a L2TP/SSTP client access RRaS server in Azure. Although RRaS is not officially supported in Azure, it can still be configured by enabling IP forwarding on the VM and adding a routing table to the vnet. The post provides step-by-step instructions on installing the Remote Access role, configuring and enabling RRaS, and setting up NAT for the VPN tunnel. It also mentions the need to assign IP addresses from a static pool and configure SSL certificate and authentication. The post concludes by inviting readers to share their experiences and alternative methods in the comments.