Learn how to use Gunicorn, a web server for Python applications, to host Flask-based APIs. Discover how Gunicorn uses pre-forking to handle requests faster and how to customize server configurations using command line flags. Follow this step-by-step guide to set up Gunicorn with Nginx and deploy a simple Flask app. Don’t forget to check out the example config file for Gunicorn to fine-tune performance and logging settings.
Tag: security
Hey Guys If you run a website or blog and you are in charge of the server such as on a VPS you might not want to let everyone know what version of apache or Linux you are running on. this gives potential attackers information that can use to attack your site. For example, if
Protecting Apache by removing version signatures and Server infoRead More »
Hey All just a quick post on WordPress authentication keys You may have noticed that in the newer versions of WordPress that in the WP-config.php file there is a block of code asking for key passphrases. That is to support encrypted cookies for your users when they login if you don’t generate the keys what
Dont forget to generate your wordpress secure cookie keys !Read More »
Sysctl is a module built into linux that allows you to modify the kernel attributes in this example I am using. Sysctl to enable SYN-cookies an effective mitigation against SYN attacks. On your linux system the sysctl configuration file is located at /etc/sysctl.conf to do this add the following to the sysctl.conf file
Auditing and checking your server to ensure that it is compliant based on your configuration and also ensuring total security is key. Many administrators get locked up with working on day to day tasks that sometimes this very important task goes undone. Here are some tools that can help automate auditing and also provide monitoring
Hello Everyone!, Sorry for being MIA its been crazy busy for me lately So sometimes I get asked how you can manage users on the UTM for things like the User Portal without creating local accounts so my answer is either Active directory or LDAP. I have already showed how to setup the AD login
I posted some time ago about the benefits of using Cloudflare See my video below if you are not familiar with Cloudflare which is a cloud CDN/WAF Cloudflare provides a proxy between the internet and your website all traffic is intended to through the Cloudflare network where it is then filtered via the rules
Enhancing your websites protection while using CloudflareRead More »
If you have been hearing the news lately there has been a lot of media attention about Bitcoin. What is bitcoin ?, Bitcoin is a cryptocurrency that is digital and has no central body governing it which also means there are no middlemen such as banks or other financial institutions. Whatever your reasons for
I have covered the importance of MFA(Multi Factor Authentication) aka 2 factor security with more and more vendors such as Gmail Outlook and others now supporting MFA there is no reason not to have it enabled. MFA is the answer to a lot of security issues when it comes to authentication. One of the common complaints
In my day to day Job, I have been responsible for mitigating DDoS attacks and making sure that they are detected in a timely manner. The company I work for has an awesome platform to mitigate DDoS attacks which have an alert system and analytics but I came across a public tool that you can
A SYN attack is an exploit of the TCP/IP stack where by an attacker send SYN packets and suppresses the SYN -ACK packet. This type of attack can be Volumetric where by the attacker send a large amount of data to a link to saturate the link . It can also be a trickle attack
The new wave of the internet is among us we are now in the era of IOT “Internet of things” sensors and devices that connect to the internet from home IP camera to your fridge. This wonderful new era comes with a new challenge for security professionals Some of the questions you need to
So it has been a few days since I was at the conference and I came across a few companies and products that I have not have the opportunity to see. One of the products that caught my eye was Darktrace they sell their product as the “Enterprise Immune System” essentially they are smashing
Introducing and thoughts on DARKtrace “The Enterprise Immune system”Read More »
Its been and awesome day at the Toronto Tech Security Conference. I got to speak with alot of vendors and see some of the new stuff that is on the market. It is always good to come these events to stay current with the solutions that are in the market The Trends are clear in
My Day @ Toronto Tech Security Conference by Data ConnectorsRead More »