Install Mautic using the Production Package
How to Install Mautic 5 using the Production Package on Debian 12 with Apache, PHP-FPM and MariaDB
| Site | https://www.gorbe.io |
| GitHub | https://github.com/g0rbe |
| https://twitter.com/_g0rbe |
Install Mautic using the Production Package
How to Install Mautic 5 using the Production Package on Debian 12 with Apache, PHP-FPM and MariaDB
Install Mautic 5 with Composer on Debian 12
How to Install Mautic 5 with Composer on Debian 12 with Apache, PHP-FPM and MariaDB
Install umami
How to install Umami on Debian Linux server with PostgreSQL.
Linux signals
Signals in Linux.
Linux processes and threads
Short explanation about what process and thread mean in Linux.
Linux Filesystem Hierarchy
Explaining Linux's Filesystem Hierarchy Standard.
LFCS Commands
Commands needed for Linux Foundation Certified Sysadmin.
A11:2021 – Next Steps
By design, the OWASP Top 10 is innately limited to the ten most significant risks. Every OWASP Top 10 has “on the cusp” risks considered at length for inclusion, but in the end, they didn’t make it. No matter how we tried to interpret or twist the data, the other risks were more prevalent and impactful.
By design, the OWASP Top 10 is innately limited to the ten most significant risks. Every OWASP Top 10 has “on the cusp” risks considered at length for inclusion, but in the end, they didn’t make it. No matter how we tried to interpret or twist the data, the other risks were more prevalent and impactful.
A10:2021 – Server-Side Request Forgery (SSRF)
This category is added from the Top 10 community survey (#1). The data shows a relatively low incidence rate with above average testing coverage and above-average Exploit and Impact potential ratings. As new entries are likely to be a single or small cluster of Common Weakness Enumerations (CWEs) for attention and awareness, the hope is that they are subject to focus and can be rolled into a larger category in a future edition.
This category is added from the Top 10 community survey (#1). The data shows a relatively low incidence rate with above average testing coverage and above-average Exploit and Impact potential ratings. As new entries are likely to be a single or small cluster of Common Weakness Enumerations (CWEs) for attention and awareness, the hope is that they are subject to focus and can be rolled into a larger category in a future edition.
A09:2021 – Security Logging and Monitoring Failures
Security logging and monitoring came from the Top 10 community survey (#3), up slightly from the tenth position in the OWASP Top 10 2017. Logging and monitoring can be challenging to test, often involving interviews or asking if attacks were detected during a penetration test. There isn't much CVE/CVSS data for this category, but detecting and responding to breaches is critical. Still, it can be very impactful for accountability, visibility, incident alerting, and forensics.
Security logging and monitoring came from the Top 10 community survey (#3), up slightly from the tenth position in the OWASP Top 10 2017. Logging and monitoring can be challenging to test, often involving interviews or asking if attacks were detected during a penetration test. There isn't much CVE/CVSS data for this category, but detecting and responding to breaches is critical. Still, it can be very impactful for accountability, visibility, incident alerting, and forensics.