Team LiB
Previous Section Next Section

Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X]

data
     configuration
         distributing
     RRDtool for storing large quantities of
     session
Data Encryption Standard (DES)
database problems with jail
-DBIG_SECURITY_HOLE compile option
debug messages, vulnerability
decryption
defense in depth security principle
defensible networks (Bejtlich)
Deny directive
DES (Data Encryption Standard)
detection security phase
Digest authentication 2nd
Digital Signature Algorithm (DSA) public-key encryption
directives
     <Directory\\>
     <Limit\\>
     <LimitExcept\\>
     <Proxy\\>
     <ProxyMatch\\>
     <VirtualHost\\>
     AcceptMutex
     AddHandler 2nd
     AddType
     AgentLog AgentLog (deprecated)
     Allow
     AllowEncodedSlashes
     AllowOverride
     AuthAuthoritative
     AuthDBMAuthoritative
     AuthDigestDomain
     CookieLog (deprecated)
     CustomLog
     Deny
     DirectoryIndex
     disable_classes
     disable_functions
     doc_root
     enable_dl configuration
     ErrorLog
     file_uploads
     FilesMatch
     LimitXMLRequestBody
     LogFormat
     MaxClients
     MaxRequestsPerChild
     MaxSpareServers
     MaxSpareThreads
     MinSpareServers
     MinSpareThreads
     mod_auth
     mod_auth_dbm
     open_basedir
     Options
     Order
     RefererIgnore (deprecated)
     RefererLog (deprecated)
     RLimitCPU
     RLimitMEM
     RLImitNPROC
     Satisfy configuration
     ScriptAlias
     SecFilterForceByteRange
     SecFilterInheritance
     SecFilterScanPOST
     SecFilterSelective
     SecUploadInMemoryLimit
     ServerLimit
     ServerSignature
     ServerTokens
     SetEnvIf
     SetHandler
     SSLRequireSSL
     SSLVerifyClient require
     SSLVerifyDepth 1
     StartServers
     ThreadsPerChild
     TransferLog
directory-indexing vulnerability
directory-listing vulnerability
     WebDAV
DirectoryIndex directive
disable_classes directive
disable_functions directive
DMZ architecture example
DNSRR (DNS Round Robin) load balancing
DNSSEC (Domain Name System Security Extensions)
doc_root directive
domain name
     lookup
     sharing
         cookie namespace collisions
         fake security realms
Domain Name System Security Extensions (DNSSEC)
DoS (denial of service) attacks
     Alan Ralsky retribution
     Apache-specific
         brute force against
         programming model
         vulnerabilities of
     causes
     defense strategy
     local
         kernel auditing
         PAM limits
         process accounting
     network attacks
         brute-force
         DDoS
         distributed
         egress filtering
         Linux SYN cookies defense
         malformed traffic
         reflection
         source address spoofing
         SYN flood
     self-inflicted
         Apache badly configured
         caching and cacheability
         client problems, real-life
         database connection bottleneck
         keep-alive functionality
         large files
         slow clients
         web applications poorly designed
     traffic spikes
         bandwidth stealing (hotlinking)
         content compression
         coordinated DoS attacks
         cyber-activism
         Slashdot effect
     traffic-shaping modules
     types of
DSA (Digital Signature Algorithm) public-key encryption
dynamic-content problems
     execution wrappers
     FastCGI
     identity change per-request
     mod_perchild module versus Metux MPM
     multiple server instances
     ptrace
     solutions

Team LiB
Previous Section Next Section