SBDavid
Apr 21st, 2010
Apr 21st, 2010
keep up with known vulnerabilities
keep up with known vulnerabilities
keep up with known vulnerabilities. Here are some examples of sites that regularly post an updated list of isolated vulnerabilities:
http://www.hardened-php.net/advisories.15.html
http://www.twitter.com/milw0rm
One of the most common methods an attacker will use is to use a search engine to isolate sites running content management systems with known security holes and using the known exploit to gain access to your system. Keeping a watchful eye on matters such as this is a very important task as system administrator.