ezNcrypt offers a table level transparent data encryption solution for MySQL. This technology is purely declarative which mean you declare tables or database you want to encrypt. You then have nohing more to care about. What is nice with ezncrypt is that only the mysqld process can encrypt/decrypt the data. A set o UDF functions have been added to handle that. The key management allows to store the key locally or remotely.
Chrooted environments are known to greatly improve system and
application security by providing them with a higher degree of
isolation. The objective is to separate as much as possible from
other executables and resources the runtime environment of an
application so that if a hacker get access to it,the rest of the
system is not compromised. This technic is commonly used with
MySQL.
Traditionally, the chrooting applies at the file system level, by creating a separated and minimal operating system disk-image. The operation consists in creating a set of directories (such a /chroot/etc, /chroot/tmp, /chroot/var/tmp, /chroot/usr/local/mysql etc.) and duplicate a minimal number of binary and configuration files into this new directory tree. After setting the right permissions on the new directories, the chrootuid utility is used to execute the application in the restricted environment. …
[Read more]
Chrooted environments are known to greatly improve system and
application security by providing them with a higher degree of
isolation. The objective is to separate as much as possible from
other executables and resources the runtime environment of an
application so that if a hacker get access to it,the rest of the
system is not compromised. This technic is commonly used with
MySQL.
Traditionally, the chrooting applies at the file system level, by creating a separated and minimal operating system disk-image. The operation consists in creating a set of directories (such a /chroot/etc, /chroot/tmp, /chroot/var/tmp, /chroot/usr/local/mysql etc.) and duplicate a minimal number of binary and configuration files into this new directory tree. After setting the right permissions on the new directories, the chrootuid utility is used to execute the application in the restricted environment. …
[Read more]
Chrooted environments are known to greatly improve system and
application security by providing them with a higher degree of
isolation. The objective is to separate as much as possible from
other executables and resources the runtime environment of an
application so that if a hacker get access to it,the rest of the
system is not compromised. This technic is commonly used with
MySQL.
Traditionally, the chrooting applies at the file system level, by creating a separated and minimal operating system disk-image. The operation consists in creating a set of directories (such a /chroot/etc, /chroot/tmp, /chroot/var/tmp, /chroot/usr/local/mysql etc.) and duplicate a minimal number of binary and configuration files into this new directory tree. After setting the right permissions on the new directories, the chrootuid utility is used to execute the application in the restricted environment. …
[Read more]Wednesday January 27th, Join the Sun Startup Essentials Webinar on Security for Web Applications.
A key success factor for Web startups is to protect their applications and data from different security threats. Join this webinar to learn about security challenges and about key solutions such as encryption, authentication, certificates, secure and fault-tolerant storage, chrooted environments. The Sun Startup Essentials experts will also cover how to implement these solutions at minimal cost by using standard and open components such as Apache, MySQL, ZFS and more.
Registration limited to members of the Sun Startup Essentials program.
Your company is less than 6 year and 150 employee: Join Sun Startup Essentials >>
Wednesday January 27th, Join the Sun Startup Essentials Webinar on Security for Web Applications.
A key success factor for Web startups is to protect their applications and data from different security threats. Join this webinar to learn about security challenges and about key solutions such as encryption, authentication, certificates, secure and fault-tolerant storage, chrooted environments. The Sun Startup Essentials experts will also cover how to implement these solutions at minimal cost by using standard and open components such as Apache, MySQL, ZFS and more.
Registration limited to members of the Sun Startup Essentials program.
Your company is less than 6 year and 150 employee: Join Sun Startup Essentials >>
Wednesday January 27th, Join the Sun Startup Essentials Webinar on Security for Web Applications.
A key success factor for Web startups is to protect their applications and data from different security threats. Join this webinar to learn about security challenges and about key solutions such as encryption, authentication, certificates, secure and fault-tolerant storage, chrooted environments. The Sun Startup Essentials experts will also cover how to implement these solutions at minimal cost by using standard and open components such as Apache, MySQL, ZFS and more.
Registration limited to members of the Sun Startup Essentials program.
Your company is less than 6 year and 150 employee: Join Sun Startup Essentials >>
We are planning on a Webinar in January about security for Web applications. We will cover topics such as encryption, authentication, data integrity and securing Linux/Unix and MySQL.
This webinar will be limited to the Sun Startup Essentials members.
If you ave any questions related to security, let us know in
advance - I'll be checking the comments.
We are planning on a Webinar in January about security for Web applications. We will cover topics such as encryption, authentication, data integrity and securing Linux/Unix and MySQL.
This webinar will be limited to the Sun Startup Essentials members.
If you ave any questions related to security, let us know in
advance - I'll be checking the comments.
We are planning on a Webinar in January about security for Web applications. We will cover topics such as encryption, authentication, data integrity and securing Linux/Unix and MySQL.
This webinar will be limited to the Sun Startup Essentials members.
If you ave any questions related to security, let us know in
advance - I'll be checking the comments.