Showing entries 11 to 20 of 32
« 10 Newer Entries | 10 Older Entries »
Displaying posts with tag: Technology Tid Bits (reset)
HowTo: Using Virtualization to Secure MySQL in a Chrooted Environment

Chrooted environments are known to greatly improve system and application security by providing them with a higher degree of isolation. The objective is to separate as much as possible from other executables and resources the runtime environment of an application so that if a hacker get access to it,the rest of the system is not compromised. This technic is commonly used with MySQL.

Traditionally, the chrooting applies at the file system level, by creating a separated and minimal operating system disk-image.  The operation consists in creating a set of directories (such a /chroot/etc, /chroot/tmp, /chroot/var/tmp, /chroot/usr/local/mysql etc.) and duplicate a minimal number of binary and configuration files into this new directory tree. After setting the right permissions on the new directories, the chrootuid utility is used to execute the application in the restricted environment. …

[Read more]
HowTo: Using Virtualization to Secure MySQL in a Chrooted Environment

Chrooted environments are known to greatly improve system and application security by providing them with a higher degree of isolation. The objective is to separate as much as possible from other executables and resources the runtime environment of an application so that if a hacker get access to it,the rest of the system is not compromised. This technic is commonly used with MySQL.

Traditionally, the chrooting applies at the file system level, by creating a separated and minimal operating system disk-image.  The operation consists in creating a set of directories (such a /chroot/etc, /chroot/tmp, /chroot/var/tmp, /chroot/usr/local/mysql etc.) and duplicate a minimal number of binary and configuration files into this new directory tree. After setting the right permissions on the new directories, the chrootuid utility is used to execute the application in the restricted environment. …

[Read more]
Tech Webinar: Security for Web Application

Wednesday January 27th, Join the Sun Startup Essentials Webinar on  Security for Web Applications.

A key success factor for Web startups is to protect their applications and data from different security threats. Join this webinar to learn about security challenges and about key solutions such as encryption, authentication, certificates, secure and fault-tolerant storage, chrooted environments. The Sun Startup Essentials experts will also cover how to implement these solutions at minimal cost by using standard and open components such as Apache, MySQL, ZFS and more.

Registration limited to members of the Sun Startup Essentials program.

Your company is less than 6 year and  150 employee: Join Sun Startup Essentials >>

Tech Webinar: Security for Web Application

Wednesday January 27th, Join the Sun Startup Essentials Webinar on  Security for Web Applications.

A key success factor for Web startups is to protect their applications and data from different security threats. Join this webinar to learn about security challenges and about key solutions such as encryption, authentication, certificates, secure and fault-tolerant storage, chrooted environments. The Sun Startup Essentials experts will also cover how to implement these solutions at minimal cost by using standard and open components such as Apache, MySQL, ZFS and more.

Registration limited to members of the Sun Startup Essentials program.

Your company is less than 6 year and  150 employee: Join Sun Startup Essentials >>

Tech Webinar: Security for Web Application

Wednesday January 27th, Join the Sun Startup Essentials Webinar on  Security for Web Applications.

A key success factor for Web startups is to protect their applications and data from different security threats. Join this webinar to learn about security challenges and about key solutions such as encryption, authentication, certificates, secure and fault-tolerant storage, chrooted environments. The Sun Startup Essentials experts will also cover how to implement these solutions at minimal cost by using standard and open components such as Apache, MySQL, ZFS and more.

Registration limited to members of the Sun Startup Essentials program.

Your company is less than 6 year and  150 employee: Join Sun Startup Essentials >>

VirtualBox Factory: HowTo Automate VBox Provisioning in a Cloud

For many years now, Sun provides ISVs with on-line access to Solaris, MySQL, PostgreSQL, Java, Netbeans, compilers, and much more.  This service is named EZQual and is used to evaluate Sun software,  and port and test applications on the Sun platform. To satisfy the demand we must be able to host many ISVs on a single system so we decided from scratch that the service would be implemented using virtualization, just like a cloud. Also, to provide a better user experience we decided to offer a remote desktop feature that, in conjunction with the virtualiztion, really offers what is known as a virtual desktop.

So far virtualization has been based on Solaris containers. Amongst other advantages, containers are easily provisioned by cloning a first template container. This feature is useful when - like us - you provision a …

[Read more]
VirtualBox Factory: HowTo Automate VBox Provisioning in a Cloud

For many years now, Sun provides ISVs with on-line access to Solaris, MySQL, PostgreSQL, Java, Netbeans, compilers, and much more.  This service is named EZQual and is used to evaluate Sun software,  and port and test applications on the Sun platform. To satisfy the demand we must be able to host many ISVs on a single system so we decided from scratch that the service would be implemented using virtualization, just like a cloud. Also, to provide a better user experience we decided to offer a remote desktop feature that, in conjunction with the virtualiztion, really offers what is known as a virtual desktop.

So far virtualization has been based on Solaris containers. Amongst other advantages, containers are easily provisioned by cloning a first template container. This feature is useful when - like us - you provision a …

[Read more]
VirtualBox Factory: HowTo Automate VBox Provisioning in a Cloud

For many years now, Sun provides ISVs with on-line access to Solaris, MySQL, PostgreSQL, Java, Netbeans, compilers, and much more.  This service is named EZQual and is used to evaluate Sun software,  and port and test applications on the Sun platform. To satisfy the demand we must be able to host many ISVs on a single system so we decided from scratch that the service would be implemented using virtualization, just like a cloud. Also, to provide a better user experience we decided to offer a remote desktop feature that, in conjunction with the virtualiztion, really offers what is known as a virtual desktop.

So far virtualization has been based on Solaris containers. Amongst other advantages, containers are easily provisioned by cloning a first template container. This feature is useful when - like us - you provision a …

[Read more]
Operating a Drupal Site behind a Reverse Proxy Server (Apache)

It's often not desirable to expose your Drupal server directly to the end users. This document describes how to “hide” a Drupal server behind a reverse proxy server. This is typically done for a number of reasons:

  • protection: the topology of the server, the database server can be hidden from the front end

  • caching: The proxy server take away load from the backend system through caching

  • flexibility: the topology behind the reverse proxy can be changed more easily

  • scalability: the proxy server can be used for future load balancing

The technical problem isn't new. It has been solved before. I had however problems finding a solution in a single document.

The configuration is basically a platform neutral AMP stack …

[Read more]
Webinar Security for MySQL and Web Application

We are planning on a Webinar in January about security for Web applications. We will cover topics such as encryption, authentication, data integrity and securing Linux/Unix and MySQL.

This webinar will be limited to the Sun Startup Essentials members.

If you ave any questions related to security, let us know in advance - I'll be checking the comments.

Showing entries 11 to 20 of 32
« 10 Newer Entries | 10 Older Entries »