Web Proxy User Activity Reporting

I inherited a number of Perl, shell, and TCL scripts that produce reports from web proxy logs.  The web proxies are scattered around the planet.  Each day at midnight local proxy time the compressed logs are exported to a centralized repository.  A set of CRON jobs executes the main script that takes as argument the region and date of the date of the log to be processed.

Since the logs are exported as compressed file and each region has two or more proxies, the main processing script must first combined the compressed logs for each region.  Once that is done several other scripts are called in turn which produce various reports such as top domain and top user. These scripts call other scripts which call other script….You get the idea.

The scripts had no error reporting so my first task after taking over from the consultant who wrote them was to add echo statements and some simple checks for exit status.  The shell scripts all use similar information on file locations, etc.  Instead of hard coding this information into each script I created another shell script that contains all the environment information.  Making a change to one script requires making a change to several others.  Messy. And time consuming.

I have decided to rewrite the whole bloody mess to do better error reporting, to put all the processing into one location, to make use of date types that do not exits in bash, and to practice my Perl.  Of course in typical hacker fashion I have started coding even before I have an architecture worked out.  I tend to keep all this in my head.  This does not always work out well especially when the problems require thinking in depth.

Nessus review by PC Magazine

Nessus review by PC Magazine: "Based on a client/server architecture, Nessus lets users run the administrative console, which executes vulnerability scans and holds databases on a machine other than the ser".

I personally think PC Magazine was dismissive of Nessus. These magazines tend to be biased against the non-Windows platforms. I have not done so myself but one can write one's own security scans via the Nessus plug-in language (NASL) and there is at least on Perl module available to programmatically control Nessus. My employer has built a Linux, Apache, PostgreSQL, and Perl based vulnerability assessment application around the Nessus security scanner.

Managing Linux Security Effectively in 2004

Managing Linux Security Effectively in 2004 by Benjamin D. Thomas (https://web.archive.org/)

This article examines the process of proper Linux security management in 2004. First, a system should be hardened and patched. Next, a security routine should be established to ensure that all new vulnerabilities are addressed. Linux security should be treated as an evolving proces

The article discusses the increasing importance of Linux security in the business world. It highlights historical incidents of server compromises due to delayed updates and stresses the need for a proactive security approach. The EnGarde Secure Linux platform is mentioned as a comprehensive solution for managing various security aspects.