Tag

ModSecurity

1 views collected around this technical thread.

Efficient Ops
Efficient Ops
Oct 31, 2023 · Information Security

Step‑by‑Step Guide to Install and Use WAF‑FLE for ModSecurity Log Management

This article walks you through installing the open‑source WAF‑FLE console, configuring its PHP/LNMP environment, setting up ModSecurity log ingestion with mlog2waffle, and troubleshooting common issues so you can efficiently monitor and analyze web‑application firewall events.

InstallationLog ManagementModSecurity
0 likes · 7 min read
Step‑by‑Step Guide to Install and Use WAF‑FLE for ModSecurity Log Management
php中文网 Courses
php中文网 Courses
Jun 11, 2023 · Information Security

Protecting Nginx with a ModSecurity Web Application Firewall (WAF)

This article explains why web applications need a Web Application Firewall, introduces ModSecurity as a WAF for Nginx, and provides step‑by‑step installation, configuration, custom rule creation, and service restart commands to defend against attacks such as SQL injection and XSS.

ModSecurityNginxSQL injection
0 likes · 4 min read
Protecting Nginx with a ModSecurity Web Application Firewall (WAF)
Efficient Ops
Efficient Ops
Apr 26, 2021 · Information Security

Deploying WAF-FLE: A Step‑by‑Step Guide to Managing ModSecurity Logs

This article walks you through installing and configuring the open‑source WAF‑FLE console—written in PHP—to collect, search, and visualize ModSecurity logs on Apache or Nginx, covering environment setup, database creation, sensor configuration, and troubleshooting common integration issues.

Log AnalysisModSecurityNginx
0 likes · 8 min read
Deploying WAF-FLE: A Step‑by‑Step Guide to Managing ModSecurity Logs
Architect
Architect
Jan 19, 2016 · Information Security

100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook

The article presents a comprehensive list of one hundred concrete web‑application security techniques—ranging from HTTP request analysis and token validation to WAF rule conversion, honeypot deployment, IP reputation checks, and response‑time monitoring—derived from the book “Web Application Defender's Cookbook” and illustrated with real‑world examples and tool references.

Defense TechniquesModSecuritysecurity operations
0 likes · 16 min read
100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook
Qunar Tech Salon
Qunar Tech Salon
Dec 17, 2015 · Information Security

100 Web Application Defense Techniques from the ‘Web Application Defender’s Cookbook’

The article presents a comprehensive list of one hundred practical web‑application defense techniques—ranging from HTTP request analysis and ModSecurity rule creation to honeypot deployment and automated threat intelligence—drawn from the under‑appreciated book “Web Application Defender’s Cookbook.”

Defensive TechniquesModSecurityinformation security
0 likes · 17 min read
100 Web Application Defense Techniques from the ‘Web Application Defender’s Cookbook’