keep up with known vulnerabilities
keep up with known vulnerabilities. Here are some examples of sites that regularly post an updated list of isolated vulnerabilities:
http://www.hardened-php.net/advisories.15.html
http://www.twitter.com/milw0rm
One of the most common methods an attacker will use is to use a search engine to isolate sites running content management systems with known security holes and using the known exploit to gain access to your system. Keeping a watchful eye on matters such as this is a very important task as system administrator.
Leave a Reply
You must be logged in to post a comment.