LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 31st, 2014
Linux Security Week: October 27th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Why Security Matters to us All Print E-mail
User Rating:      How can I rate this item?
Source: HostReview - Posted by Alex   
Server Security Your website may not be as secure as you once thought... Most people take the Internet for granted. When it comes to the Internet as we know it Social Networks, Media Sites, Email, File Repositories, etc. usability is as far as our concern extends. If it works, that is all we care about. But the truth of the matter is that understanding the complexity of the Internet also helps you to understand why security is so overwhelmingly important, yet often overlooked.

To understand the nature of the beast is to be aware that your personal websites, reseller accounts, VPS servers, Cloud Servers, Dedicated Servers, Clusters, and server farms all reside in facilities known as datacenters. A datacenter is nothing more than a purpose-built facility with special infrastructure large amounts of power, cooling, fiber connections and any number of physical devices such as routers, switches, firewalls, load balancers and server hardware (powerful computers with public and private Internet connectivity to which people or other computers connect). What most people fail to realize is how and where their slice of that infrastructure is located and the typical events that are ongoing every second of every day attempting to penetrate and gain access to them.

Read this full article at HostReview

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Pirate Bay founder guilty in historic hacker case
Parallels CTO: Linux container security is not the problem
Advisory says to assume all Drupal 7 websites are compromised
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.