Security

Ant Media Server Firewall Configuration

Ant Media Server Firewall Configuration

Set Ant Media Server Firewall Rules Use the following rules for Ant Media Server Firewall Configuration: 1 2 3 4 5 6 7 8 ufw allow ssh ufw allow http ufw allow https ufw allow 1935/tcp ufw allow 5080/tcp ufw allow 5443/tcp ufw allow 5000:65000/udp enable ufw After enabling, you will have following status 1 …

Ant Media Server Firewall Configuration Read More »

RubyGems dependency confusion attack side of things

Note: This article is not to deprecate any of the findings and achievements of Alex Birsan. He did great work exploiting specific vulnerabilities and patterns. It is to present the RubyGems side of the story and to reassure you. We actively work to provide a healthy and safe ecosystem for our users. After reading the …

RubyGems dependency confusion attack side of things Read More »

RubyGems Bitcoin Stealing Malware postmortem 1

RubyGems Bitcoin Stealing Malware postmortem

Introduction On the 7th and 13th of December, there were two malicious packages uploaded to RubyGems. Here’s the postmortem and analysis of the packages’ content. Diffend.io platform that I run closely cooperates with the RubyGems team, providing immediate insights into any gems that have “weird” characteristics. Thanks to that, the gems were yanked relatively fast. …

RubyGems Bitcoin Stealing Malware postmortem Read More »

Diffend – OSS supply chain security and management platform for Ruby 3

Diffend – OSS supply chain security and management platform for Ruby

I’m incredibly excited to announce a security platform for managing Ruby gems dependencies: diffend.io. This platform is a result of my involvement in Ruby security matters for years. It all started in early 2018 with a tool to review gems versions diffs. While working on it, I’ve noticed that there’s much more that needs to …

Diffend – OSS supply chain security and management platform for Ruby Read More »

How to take over a Ruby gem and what to do with it / RubyKaigi 2019 presentation

Using Ruby gems is safe, right? We’re a nice community of friendly beings that act towards the same goal: making Ruby better. But is that true? Can we just blindly use libraries, without making sure, that they are what they are supposed to be? Learn how you can take over a gem, what you can …

How to take over a Ruby gem and what to do with it / RubyKaigi 2019 presentation Read More »

Install and Configure CSF ConfigServer Firewall

Install and Configure CSF ConfigServer Firewall

Install and Configure CSF ConfigServer Firewall About CSF Firewall ConfigServer Security and Firewall, also known as CSF, is an opensource software firewall application. It is working based on iptables. Firewall configuration script created to provide better security for your server while giving you an easy to use, advanced interface for managing your firewall settings. CSF configures …

Install and Configure CSF ConfigServer Firewall Read More »

Protecting Apache Server From Denial-of-Service Attacks

Protecting Apache Server From Denial-of-Service Attacks Denial-of-Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. A distributed denial-of-service (DDoS) is where the attack source is more than one–and often …

Protecting Apache Server From Denial-of-Service Attacks Read More »

Setup SSH Keys on Ubuntu 18.04 8

Setup SSH Keys on Ubuntu 18.04

Who should read this? This tutorial is for novice to intermediate linux users who want to go beyond basic password security.  Security professionals recommend using ssh keys to make authentication into ssh sessions faster, easier and more secure.   As passwords become longer and more complex they become more difficult to use and manage. Key based …

Setup SSH Keys on Ubuntu 18.04 Read More »

How to setup OpenVPN on your VPS: Ubuntu 18.04 13

How to setup OpenVPN on your VPS: Ubuntu 18.04

Who should read this tutorial:   This tutorial is written for novice level Linux users and DevOps folks who need to add encryption to their internet traffic.  A virtual private network (an encrypted network over the public internet) to access specific networks or services from the outside is the way to go.   What are …

How to setup OpenVPN on your VPS: Ubuntu 18.04 Read More »