A client recently had a stream of attacks on several of their online applications. Thanks to excellent monitoring, solid architecture and nice, clean installations, the attacks were easily rebuffed. Cheers to all involved. Just the same, the attacks gave me some insights on what a typical attack vector looks like to an online intruder. There were certainly some patterns in the commands directed at each server or application. As I said, the client faired very well. However, the incident gave us an excellent opportunity to review our monitoring efforts and even more interesting, our security...
Security Hardening Open Source Projects
