Fail2ban
   HOME



picture info

Fail2ban
Fail2Ban is an intrusion prevention system, intrusion prevention software framework. Written in the Python (programming language), Python programming language, it is designed to prevent brute-force attacks. It is able to run on POSIX systems that have an interface to a packet-control system or firewall installed locally, such as iptables or TCP Wrapper. Functionality Fail2ban operates by monitoring Computer data logging, log files (e.g. , , etc.) for selected entries and running scripts based on them. Most commonly this is used to block selected IP addresses that may belong to Host (network), hosts that are trying to breach the system's security. It can ban any host IP address that makes too many login attempts or performs any other unwanted action within a time frame defined by the administrator. It includes support for both IPv4 and IPv6. Optionally longer bans can be custom-configured for "recidivist" abusers that keep coming back. Fail2Ban is typically set up to unban a block ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Python (programming Language)
Python is a high-level programming language, high-level, general-purpose programming language. Its design philosophy emphasizes code readability with the use of significant indentation. Python is type system#DYNAMIC, dynamically type-checked and garbage collection (computer science), garbage-collected. It supports multiple programming paradigms, including structured programming, structured (particularly procedural programming, procedural), object-oriented and functional programming. It is often described as a "batteries included" language due to its comprehensive standard library. Guido van Rossum began working on Python in the late 1980s as a successor to the ABC (programming language), ABC programming language, and he first released it in 1991 as Python 0.9.0. Python 2.0 was released in 2000. Python 3.0, released in 2008, was a major revision not completely backward-compatible with earlier versions. Python 2.7.18, released in 2020, was the last release of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Application Programming Interface
An application programming interface (API) is a connection between computers or between computer programs. It is a type of software Interface (computing), interface, offering a service to other pieces of software. A document or standard that describes how to build such a connection or interface is called an ''API specification''. A computer system that meets this standard is said to ''implement'' or ''expose'' an API. The term API may refer either to the specification or to the implementation. In contrast to a user interface, which connects a computer to a person, an application programming interface connects computers or pieces of software to each other. It is not intended to be used directly by a person (the end user) other than a computer programmer who is incorporating it into software. An API is often made up of different parts which act as tools or services that are available to the programmer. A program or a programmer that uses one of these parts is said to ''call'' that ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


DenyHosts
DenyHosts is a log-based intrusion-prevention security tool for SSH servers written in Python. It is intended to prevent brute-force attacks on SSH servers by monitoring invalid login attempts in the authentication log and blocking the originating IP addresses. DenyHosts is developed by Phil Schwartz, who is also the developer of Kodos Python Regular Expression Debugger. Operation DenyHosts checks the end of the authentication log for recent failed login attempts. It records information about their originating IP addresses and compares the number of invalid attempts to a user-specified threshold. If there have been too many invalid attempts it assumes a dictionary attack is occurring and prevents the IP address from making any further attempts by adding it to /etc/hosts.deny on the server. DenyHosts 2.0 and above support centralized synchronization, so that repeat offenders are blocked from many computers. The sitdenyhosts.netgathers statistics from computers running the software. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


TechTarget
TechTarget, Inc. (doing business as Informa TechTarget) is an American company that offers data-driven marketing services to business-to-business technology vendors. TechTarget, Inc. was founded in 1999; it is headquartered in Newton, Massachusetts, with offices in London, Munich, Paris, San Francisco, Singapore and Sydney. History TechTarget was founded in 1999 by Greg Strakosch and Don Hawk as a spin-off of United Communications Group (UCG), the owner of Oil Price Information Service. In 2001, the company was recognized by ''B2B'' magazine on their Media Power 50 list. In 2005, AdAge named CEO Greg Strakosch a Top 25 Newsmaker. In 2016, TechTarget named Michael Cotoia as CEO and board member, and elected Greg Stakosch as executive chairman. The company had an initial public offering An initial public offering (IPO) or stock launch is a public offering in which shares of a company are sold to institutional investors and usually also to retail (individual) investors. An ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Regular Expressions
A regular expression (shortened as regex or regexp), sometimes referred to as rational expression, is a sequence of character (computing), characters that specifies a pattern matching, match pattern in string (computer science), text. Usually such patterns are used by string-searching algorithms for "find" or "find and replace" operations on string (computer science), strings, or for data validation, input validation. Regular expression techniques are developed in theoretical computer science and formal language theory. The concept of regular expressions began in the 1950s, when the American mathematician Stephen Cole Kleene formalized the concept of a regular language. They came into common use with Unix text-processing utilities. Different syntax (programming languages), syntaxes for writing regular expressions have existed since the 1980s, one being the POSIX standard and another, widely used, being the Perl syntax. Regular expressions are used in search engines, in search ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


TechRepublic
TechRepublic is an online trade publication and social community for IT professionals, providing advice on best practices and tools for the needs of IT decision-makers. It was founded in 1997 in Louisville, Kentucky, by Tom Cottingham and Kim Spalding, and debuted as a website in May 1999. The site was purchased by CNET Networks in 2001 for $23 million. TechRepublic was a part of the Red Ventures business portfolio alongside ZDNet, CNET, GameSpot, and Metacritic Metacritic is an American website that aggregates reviews of films, television shows, music albums, video games, and formerly books. For each product, the scores from each review are averaged (a weighted average). Metacritic was created .... On August 9, 2021, a Nashville-based technology marketing company, TechnologyAdvice, announced the acquisition of TechRepublic. References External links * Computing websites Former CBS Interactive websites Internet properties established in 1997 199 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Courier Mail Server
The Courier Mail Server is a mail transfer agent (MTA) server that provides Simple Mail Transfer Protocol, SMTP, IMAP, POP3, Simple Mail Access Protocol, SMAP, webmail, and electronic mailing list, mailing list services with individual components. It is best known for its IMAP server component. Courier can function as an intermediate mail relay, between an internal LAN and the Internet, or perform final delivery to mailboxes. Courier uses maildirs as its native storage format and can also deliver mail to legacy mailbox files. Configuration files are in plain text format and may include Perl scripts. Courier can provide mail services for regular operating system accounts. Courier can also provide mail services for virtual mail accounts, managed by any of Lightweight Directory Access Protocol, LDAP directory service, Berkeley DB, MySQL or PostgreSQL authentication database. Parts of Courier, such as the maildrop filtering system, the webmail and IMAP server, can also be installed ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Postfix (software)
Postfix is a free software, free and open-source software, open-source mail transfer agent (MTA) that routes and delivers E-mail, electronic mail. It is released under the IBM Public License 1.0 which is a free software license. Alternatively, starting with version 3.2.5, it is available under the Eclipse Public License 2.0 at the user's option. Originally written in 1997 by Wietse Venema at the IBM Thomas J. Watson Research Center in New York (state), New York, and first released in December 1998, Postfix continues to be actively developed by its creator and other contributors. The software is also known by its former names VMailer and IBM Secure Mailer. The name Postfix is a compound of "post" (which is another word for "mail") and "bugfix" (which is for other software that inspired Postfix development). Typical deployment As an Simple Mail Transfer Protocol, SMTP server, Postfix implements a first layer of defense against spambots and malware. Administrators can combine Post ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Qmail
qmail is a mail transfer agent (MTA) that runs on Unix. It was written, starting December 1995, by Daniel J. Bernstein as a more secure alternative to the popular Sendmail program. Originally license-free software, qmail's source code was later dedicated to the public domain by the author. Features Security When first published, qmail was the first security-aware mail transport agent; since then, other security-aware MTAs have been published. The most popular predecessor to qmail, Sendmail, was not designed with security as a goal and, as a result, has been a perennial target for attackers. In contrast to sendmail, qmail has a modular architecture composed of mutually untrusting components; for instance, the SMTP listener component of qmail runs with different credentials from the queue manager or the SMTP sender. qmail was also implemented with a security-aware replacement to the C standard library and, as a result, has not been vulnerable to stack and heap overflows ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Vsftpd
vsftpd (or very secure FTP daemon) is an FTP server for Unix-like systems, including Linux. It is the default FTP server in the Ubuntu, CentOS, Fedora, NimbleX, Slackware and RHEL Linux distributions. It is licensed under the GNU General Public License. It supports IPv6, TLS and FTPS (explicit since 2.0.0 and implicit since 2.1.0). Compromised website In July 2011, it was discovered that vsftpd version 2.3.4 downloadable from the master site had been compromised.vsftpd Compromised Source Packages Backdoor Vulnerability
at Users logging into a compromised vsftpd-2.3.4 server may issue a ":)" smileyface as the username and gain a command shell o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Secure Shell
The Secure Shell Protocol (SSH Protocol) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution. SSH was designed for Unix-like operating systems as a replacement for Telnet and unsecured remote Unix shell protocols, such as the Berkeley Remote Shell (rsh) and the related rlogin and rexec protocols, which all use insecure, plaintext methods of authentication, like passwords. Since mechanisms like Telnet and Remote Shell are designed to access and operate remote computers, sending the authentication tokens (e.g. username and password) for this access to these computers across a public network in an unsecured way poses a great risk of 3rd parties obtaining the password and achieving the same level of access to the remote system as the telnet user. Secure Shell mitigates this risk through the use of encryption mechanisms that are intended to hide th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]