Category: security

Copying and Linux Permissions

Last time I wrote about using the [`--reference` flag](/cloning-linux-perms.html) for quickly replicating various aspects of permissions in Linux. Today's post is how to copy files and retain various attributes, like permissions, ownership, and SELinux context. First, a little background on how permissions are set when copying. ## How Permissions are...

Cloning Linux Permissions

Ever have that moment where you're working on your SELinux enabled webserver and you've put in a fancy new file into `/var/www/html` and the darn thing just won't show up properly, even though everything else is working? Then that sinking realization that you have to deal with three different aspects...

Recommendations for a Security Education

Perodically I'll get asked for recommendations for good resources to get started learning about information security. I've written reviews on a number of books, and on a handful of other sources, so I thought I'd collect together some of those, as well as make some new recommendations. Most of these...

A Slightly Snarky Overview of Security for Apache Tomcat

Apache Tomcat crops up a lot, and frequently having been configured by someone without a lot of security background. I'll spend a little bit of time looking at some of what you can do to improve security at a high level - I won't be giving step by step instructions,...

Forcing YouTube to Restricted Mode with Javascript

Background ---------- Recently I enabled Safe Search Enforcement on a Palo Alto firewall. This blocks search results from Google, Bing, Yahoo, YouTube, and Yandex if their respective versions of safe search aren't enabled. By using the JavaScript code that Palo Alto provides (you can see it in the [Administrator's Guide...