Tagged articles
6 articles
Page 1 of 1
Ops Community
Ops Community
Aug 27, 2025 · Information Security

Master Apache Security: Complete Guide to Prevent Common Web Attacks

This comprehensive guide walks operations engineers through why Apache security matters, presents core hardening strategies such as hiding server details, blocking directory traversal, enforcing strict security headers, limiting request sizes, and applying IP rate‑limiting, and provides advanced techniques, verification commands, common pitfalls, and an actionable checklist to build a resilient web server.

ApacheConfigurationModSecurity
0 likes · 8 min read
Master Apache Security: Complete Guide to Prevent Common Web Attacks
php Courses
php Courses
Jun 11, 2023 · Information Security

Protecting Nginx with a ModSecurity Web Application Firewall (WAF)

This article explains why web applications need a Web Application Firewall, introduces ModSecurity as a WAF for Nginx, and provides step‑by‑step installation, configuration, custom rule creation, and service restart commands to defend against attacks such as SQL injection and XSS.

ModSecuritySQL injectionWAF
0 likes · 4 min read
Protecting Nginx with a ModSecurity Web Application Firewall (WAF)
Efficient Ops
Efficient Ops
Apr 26, 2021 · Information Security

Deploying WAF-FLE: A Step‑by‑Step Guide to Managing ModSecurity Logs

This article walks you through installing and configuring the open‑source WAF‑FLE console—written in PHP—to collect, search, and visualize ModSecurity logs on Apache or Nginx, covering environment setup, database creation, sensor configuration, and troubleshooting common integration issues.

ModSecurityNginxPHP
0 likes · 8 min read
Deploying WAF-FLE: A Step‑by‑Step Guide to Managing ModSecurity Logs
Architect
Architect
Jan 19, 2016 · Information Security

100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook

The article presents a comprehensive list of one hundred concrete web‑application security techniques—ranging from HTTP request analysis and token validation to WAF rule conversion, honeypot deployment, IP reputation checks, and response‑time monitoring—derived from the book “Web Application Defender's Cookbook” and illustrated with real‑world examples and tool references.

ModSecuritySecurity OperationsThreat Detection
0 likes · 16 min read
100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook
Qunar Tech Salon
Qunar Tech Salon
Dec 17, 2015 · Information Security

100 Web Application Defense Techniques from the ‘Web Application Defender’s Cookbook’

The article presents a comprehensive list of one hundred practical web‑application defense techniques—ranging from HTTP request analysis and ModSecurity rule creation to honeypot deployment and automated threat intelligence—drawn from the under‑appreciated book “Web Application Defender’s Cookbook.”

Defensive TechniquesModSecurityWAF
0 likes · 17 min read
100 Web Application Defense Techniques from the ‘Web Application Defender’s Cookbook’