{"id":1119,"date":"2015-05-16T07:45:54","date_gmt":"2015-05-16T12:45:54","guid":{"rendered":"http:\/\/www.d2-designs.net\/?p=1119"},"modified":"2015-05-16T09:00:55","modified_gmt":"2015-05-16T14:00:55","slug":"server-security","status":"publish","type":"post","link":"https:\/\/www.d2-designs.net\/?p=1119","title":{"rendered":"Server Security"},"content":{"rendered":"<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-1120\" src=\"http:\/\/www.d2-designs.net\/wp-content\/uploads\/2015\/05\/serverattacks-300x229.png\" alt=\"serverattacks\" width=\"300\" height=\"229\" srcset=\"https:\/\/www.d2-designs.net\/wp-content\/uploads\/2015\/05\/serverattacks-300x229.png 300w, https:\/\/www.d2-designs.net\/wp-content\/uploads\/2015\/05\/serverattacks.png 396w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Today&#8217;s top trend on server management is security. Every day there are millions of attacks on webservers across the world. I dare to use the term &#8220;hacking&#8221; because typically they aren&#8217;t. Let&#8217;s take a quick look at the definition of &#8220;Hacking&#8221;. It&#8217;s defined as\u00a0<span class=\"hvr\">gaining<\/span> <span class=\"hvr\">access<\/span> to (a <span class=\"hvr\">computer<\/span> <span class=\"hvr\">file<\/span> or <span class=\"hvr\">network)<\/span> <span class=\"hvr\">illegally<\/span> or <span class=\"hvr\">without<\/span> <span class=\"hvr\">authorization. For instance, &#8220;<a href=\"https:\/\/www.google.com\/#q=sony+email+hack\" target=\"_blank\">The Sony E-mail Hack<\/a>&#8221; was true hacking,\u00a0because the hackers gained access to Sony&#8217;s network and stole private e-mails from top executives. <\/span><\/p>\n<p style=\"text-align: justify;\"><span class=\"hvr\">What happens more often to webservers isn&#8217;t (to me) defined as true hacking. What commonly happens are DDOS attacks, e-mail spoofing\u00a0and code injection. This isn&#8217;t &#8220;hacking&#8221; as defined as above, it&#8217;s more childs play than anything. Basically, the &#8220;attacker&#8221; exploits server weaknesses to inject malware or spyware on a system, which then infects complete random computers. This is the lowest form of &#8220;hacking&#8221; and shouldn&#8217;t be given any credit because any\u00a0person with a computer and very little know how can do these sort of deeds. However, this is the trend right now and it has been the trend for some time now. <\/span><\/p>\n<p style=\"text-align: justify;\">Here&#8217;s an example of what most server administrators see on a daily basis. Basically an automated &#8220;bot&#8221; (short for robot) sends out\u00a0a predefined series of commands to random IP addresses until it <img loading=\"lazy\" decoding=\"async\" class=\" size-medium wp-image-1121 alignright\" src=\"http:\/\/www.d2-designs.net\/wp-content\/uploads\/2015\/05\/Capture-300x225.png\" alt=\"Capture\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.d2-designs.net\/wp-content\/uploads\/2015\/05\/Capture-300x225.png 300w, https:\/\/www.d2-designs.net\/wp-content\/uploads\/2015\/05\/Capture.png 514w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>can successfully connect and upload it&#8217;s files to their system. The picture to the right was blocked and logged just today. As you can see, D2-Designs had a couple of options it could take once we were notified of the situation at hand. Keep in mind that the Origin Country plays absolutely no hand in these attacks because they come from all over the world, even here in the U.S. The example also shows us\u00a0that they attempted to connect(unsuccessfully) to our FTP protocol to upload their files to one of our clients. What their &#8220;bot&#8221; can&#8217;t decipher is, we make our clients use complex passwords to log into their accounts, as well as complete random usernames. Sure, this information\u00a0may give a potential attacker a hands up but trust us when we say &#8220;We&#8217;re watching our server.&#8221; Most attacks are stopped by our automated systems, but lets say for instance that an attacker was successful &#8211; they gained access and uploaded their files. This is why antivirus software was made! Every server administrator should use software, as well as every end user (you reading this are the end user in this case). Even antivirus software isn&#8217;t fool proof, eventually some sneaky code does get through. In this case you should always have a backup of your files. I always preach, backup your backups and then back them up. We&#8217;ve used backups before, though not due to an attacker &#8220;yet&#8221; but systems fail on their own from time to time. More than that(you server administrators), should have a system in place to restore your backups, because without that a backup is just a series of\u00a0files taking up space.\u00a0Most hosting companies (hopefully all hosting companies) offer some sort of backup for their users. Most companies make it the responsibility of their clients to back up their files, which is fine, except how many times have you heard that there are no backups?&#8230;\u00a0Exactly &#8230;<\/p>\n<p style=\"text-align: justify;\">Attacks like the\u00a0one illustrated here are nothing more than words on a screen. They&#8217;re information and knowledge to the administrator. They tell you that &#8220;Hey, someone&#8217;s knocking ..\u00a0They didn&#8217;t get in, but just so you know there was an attempt.&#8221; Use it to your advantage, take everything you can out of your logs and apply\u00a0it\u00a0into protecting your server. It&#8217;s not just a\u00a0space\u00a0on a hard drive for your clients,\u00a0it&#8217;s their on-line home.\u00a0It&#8217;s\u00a0a place for the world to come and see them personally. You\u00a0should take pride in trying to protect them from the intruders, don&#8217;t just expect them to have the skill set\u00a0that you have and let them fend for themselves.\u00a0I&#8217;m not saying every\u00a0client is the ideal client, but guess what, they ARE\u00a0YOUR clients, and they deserve the protection on your servers. I like to have the mindset that if this were my house and you&#8217;re not invited, don&#8217;t just come and try to barge into my place like you own it. The more clients you have, the more\u00a0protection you and your staff should give them. Larger companies may\u00a0have automated systems to check over their\u00a0clients,\u00a0which is fine I suppose but I like having MY eyes on my logs and files and clients.<\/p>\n<p>David D.<br \/>\nD2-Designs\/Owner<br \/>\nGet Known!\u2122<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today&#8217;s top trend on server management is security. Every day there are millions of attacks on webservers across the world. I dare to use the term &#8220;hacking&#8221; because typically they aren&#8217;t. Let&#8217;s take a quick look at the definition of &#8220;Hacking&#8221;. It&#8217;s defined as\u00a0gaining access to (a computer file or network) illegally or without authorization. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,25],"tags":[48,49,45,44,46,27,30,29,47],"class_list":["post-1119","post","type-post","status-publish","format-standard","hentry","category-info","category-servers","tag-bot","tag-robot","tag-security","tag-server","tag-server-security","tag-servers-2","tag-webhost","tag-webhosting","tag-websites"],"_links":{"self":[{"href":"https:\/\/www.d2-designs.net\/index.php?rest_route=\/wp\/v2\/posts\/1119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.d2-designs.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.d2-designs.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.d2-designs.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.d2-designs.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1119"}],"version-history":[{"count":12,"href":"https:\/\/www.d2-designs.net\/index.php?rest_route=\/wp\/v2\/posts\/1119\/revisions"}],"predecessor-version":[{"id":1134,"href":"https:\/\/www.d2-designs.net\/index.php?rest_route=\/wp\/v2\/posts\/1119\/revisions\/1134"}],"wp:attachment":[{"href":"https:\/\/www.d2-designs.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.d2-designs.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.d2-designs.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}