<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.colobridge.net/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.colobridge.net/feed.php">
        <title>Colobridge WIKI безопасность</title>
        <description></description>
        <link>https://wiki.colobridge.net/</link>
        <image rdf:resource="https://wiki.colobridge.net/lib/tpl/bootstrap3-cb/images/favicon.ico" />
       <dc:date>2026-04-04T13:37:57+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/restricting_access_hypervisor_interface?rev=1752156356&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/security_checklist_hyper-v_esxi?rev=1752146418&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/security_checklist_proxmox_kvm?rev=1752146386&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/start?rev=1752145926&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%B1%D0%BB%D0%BE%D0%BA%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5_%D1%83%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D0%B8_sslv3?rev=1672056575&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%B4%D1%80%D0%BE%D0%BF%D0%BF%D0%B5%D1%80?rev=1672053155&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%B8%D1%81%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_open_relay?rev=1648825701&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BA%D0%B0%D0%BA_%D0%B7%D0%B0%D0%B1%D0%BB%D0%BE%D0%BA%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D1%82%D1%8C_%D1%81%D0%BF%D0%B0%D0%BC?rev=1672057330&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BD%D0%B0%D1%81%D1%82%D1%80%D0%BE%D0%B9%D0%BA%D0%B0_rkhunter?rev=1648825701&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BD%D0%B0%D1%81%D1%82%D1%80%D0%BE%D0%B9%D0%BA%D0%B0_%D0%B7%D0%B0%D1%89%D0%B8%D1%82%D1%8B_%D0%B2%D0%B5%D0%B1%D1%81%D0%B5%D1%80%D0%B2%D0%B5%D1%80%D0%B0?rev=1672062877&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D1%80%D0%BE%D0%B2%D0%B5%D1%80%D0%BA%D0%B0_linux-%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D1%8B_%D0%BD%D0%B0_%D0%BD%D0%B0%D0%BB%D0%B8%D1%87%D0%B8%D0%B5_%D1%81%D0%BB%D0%B5%D0%B4%D0%BE%D0%B2_%D0%B2%D0%B7%D0%BB%D0%BE%D0%BC%D0%B0?rev=1712143461&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D1%80%D0%BE%D0%B2%D0%B5%D1%80%D0%BA%D0%B0_%D1%81%D0%B5%D1%80%D0%B2%D0%B5%D1%80%D0%B0_%D0%B0%D0%BD%D1%82%D0%B8%D0%B2%D0%B8%D1%80%D1%83%D1%81%D0%BD%D1%8B%D0%BC_%D0%BF%D0%BE?rev=1648825701&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D1%80%D0%BE%D1%82%D0%B8%D0%B2%D0%BE%D0%B4%D0%B5%D0%B9%D1%81%D1%82%D0%B2%D0%B8%D0%B5_%D0%B0%D1%82%D0%B0%D0%BA%D0%B0%D0%BC_dns_amplification_ddos?rev=1648825701&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D1%80%D0%BE%D1%82%D0%B8%D0%B2%D0%BE%D0%B4%D0%B5%D0%B9%D1%81%D1%82%D0%B2%D0%B8%D0%B5_%D0%B0%D1%82%D0%B0%D0%BA%D0%B0%D0%BC_%D0%BD%D0%B0_ssh?rev=1648825701&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D1%81%D0%B5%D1%80%D0%B2%D0%B5%D1%80_%D0%BF%D0%BE%D0%BF%D0%B0%D0%BB_%D0%B2_%D1%81%D0%BF%D0%B0%D0%BC%D0%BB%D0%B8%D1%81%D1%82?rev=1648825701&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D1%81%D0%BE%D0%BE%D0%B1%D1%89%D0%B5%D0%BD%D0%B8%D1%8F_%D0%BE%D0%B1_%D1%83%D1%8F%D0%B7%D0%BC%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D1%8F%D1%85_%D0%B2_%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D1%8F%D1%85?rev=1672064622&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D1%87%D1%82%D0%BE_%D0%B4%D0%B5%D0%BB%D0%B0%D1%82%D1%8C_%D0%B5%D1%81%D0%BB%D0%B8_%D0%B2%D0%B7%D0%BB%D0%BE%D0%BC%D0%B0%D0%BB%D0%B8?rev=1672062918&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.colobridge.net/lib/tpl/bootstrap3-cb/images/favicon.ico">
        <title>Colobridge WIKI</title>
        <link>https://wiki.colobridge.net/</link>
        <url>https://wiki.colobridge.net/lib/tpl/bootstrap3-cb/images/favicon.ico</url>
    </image>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/restricting_access_hypervisor_interface?rev=1752156356&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-07-10T14:05:56+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Restricting Access to the Hypervisor Interface on VMware ESXi 6.7</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/restricting_access_hypervisor_interface?rev=1752156356&amp;do=diff</link>
        <description>Restricting Access to the Hypervisor Interface on VMware ESXi 6.7

 🔐 Why Restricting Access to the Hypervisor Interface Is Critically Important 

1. Vulnerable Entry Point: Management Interface = Gateway to Infrastructure

Management interfaces like SSH or the ESXi web UI run with high privileges. 
If an attacker gains access, it&#039;s a direct path to all virtual machines and data.</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/security_checklist_hyper-v_esxi?rev=1752146418&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-07-10T11:20:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>✅ Security Checklist for Hyper-V / VMware ESXi</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/security_checklist_hyper-v_esxi?rev=1752146418&amp;do=diff</link>
        <description>✅ Security Checklist for Hyper-V / VMware ESXi

	&quot; Use this checklist to verify the security of your virtualization environment. Recommended review frequency: quarterly or after significant infrastructure changes.&quot;

🔐 1. Access and Authentication</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/security_checklist_proxmox_kvm?rev=1752146386&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-07-10T11:19:46+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>✅ Security Checklist for Proxmox VE / KVM (libvirt)</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/security_checklist_proxmox_kvm?rev=1752146386&amp;do=diff</link>
        <description>✅ Security Checklist for Proxmox VE / KVM (libvirt)

	&quot; This checklist covers key security practices for open-source virtualization environments based on Linux (Proxmox VE, KVM, libvirt, QEMU).&quot;

🔐 1. Access and Authentication

	*  Root login to Proxmox Web UI is disabled (sudo accounts are used).</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/start?rev=1752145926&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-07-10T11:12:06+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Безопасность</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/start?rev=1752145926&amp;do=diff</link>
        <description>Безопасность

О безопасности и защите ваших серверов

	*  Restricting Access to the Hypervisor Interface on VMware ESXi 6.7
	*  Security Checklist for Hyper-V / VMware ESXi
	*  Security Checklist for Proxmox VE / KVM (libvirt)
	*  Настройка защиты вебсервера
	*  Сообщения об уязмимостях в новостях
	*  Что делать если взломали?
	*  Проверка Linux-системы на наличие следов взлома
	*  Проверка сервера антивирусным ПО
	*  Настройка rkhunter
	*  Дроппер / Dropper
	*  Противодействие атакам на SSH
	* …</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%B1%D0%BB%D0%BE%D0%BA%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5_%D1%83%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D0%B8_sslv3?rev=1672056575&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-12-26T12:09:35+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>блокирование уязвимости sslv3</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%B1%D0%BB%D0%BE%D0%BA%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5_%D1%83%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D0%B8_sslv3?rev=1672056575&amp;do=diff</link>
        <description>блокирование уязвимости sslv3

Применимость: Linux

Слова для поиска: 

----------

Задача:

Исследователи безопасности из компании Google сообщили о новом виде атаки POODLE (CVE-2014-3566), которая позволяет атакующему извлечь из зашифрованного канала связи закрытую информацию, такую как содержимое Cookies, которые могут содержать идентификаторы сеанса и коды доступа, что сводит на нет средства обеспечения безопасного соединения на основе протокола SSL 3.0.…</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%B4%D1%80%D0%BE%D0%BF%D0%BF%D0%B5%D1%80?rev=1672053155&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-12-26T11:12:35+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>дроппер</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%B4%D1%80%D0%BE%D0%BF%D0%BF%D0%B5%D1%80?rev=1672053155&amp;do=diff</link>
        <description>дроппер

----------

“Дроппер” (Dropper)

файл - носитель, устанавливающий вирус в систему. Техника иногда используемая вирусописателями для “прикрытия</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%B8%D1%81%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_open_relay?rev=1648825701&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-04-01T15:08:21+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>исправление open relay</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%B8%D1%81%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_open_relay?rev=1648825701&amp;do=diff</link>
        <description>исправление open relay

Применимость: mail relay

Слова для поиска: mail spam relay

	*  Проверка используя сервисы: &lt;http://mxtoolbox.com/diagnostic.aspx&gt;, &lt;http://www.mailradar.com/openrelay/&gt; либо другие
	*  В случае если проверка показала, что сервер настроен как open relay - исправить по правилам ниже:</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BA%D0%B0%D0%BA_%D0%B7%D0%B0%D0%B1%D0%BB%D0%BE%D0%BA%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D1%82%D1%8C_%D1%81%D0%BF%D0%B0%D0%BC?rev=1672057330&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-12-26T12:22:10+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>как заблокировать спам</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BA%D0%B0%D0%BA_%D0%B7%D0%B0%D0%B1%D0%BB%D0%BE%D0%BA%D0%B8%D1%80%D0%BE%D0%B2%D0%B0%D1%82%D1%8C_%D1%81%D0%BF%D0%B0%D0%BC?rev=1672057330&amp;do=diff</link>
        <description>как заблокировать спам

Применимость: &lt;mail postfix exim sendmail spam recovery&gt;

----------

Задача:

Выявление спам активности, нахождение скриптов/процессов осуществляющие данную активность,  базовые методы противодействия</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BD%D0%B0%D1%81%D1%82%D1%80%D0%BE%D0%B9%D0%BA%D0%B0_rkhunter?rev=1648825701&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-04-01T15:08:21+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Настройка rkhunter</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BD%D0%B0%D1%81%D1%82%D1%80%D0%BE%D0%B9%D0%BA%D0%B0_rkhunter?rev=1648825701&amp;do=diff</link>
        <description>Настройка rkhunter

Применимость: Linux

Слова для поиска: антивирус, руткит rootkit

----------

Задача:

Чем защитить систему от взлома?
Чем проверить факт взлома защиты?</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BD%D0%B0%D1%81%D1%82%D1%80%D0%BE%D0%B9%D0%BA%D0%B0_%D0%B7%D0%B0%D1%89%D0%B8%D1%82%D1%8B_%D0%B2%D0%B5%D0%B1%D1%81%D0%B5%D1%80%D0%B2%D0%B5%D1%80%D0%B0?rev=1672062877&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-12-26T13:54:37+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>настройка защиты вебсервера</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BD%D0%B0%D1%81%D1%82%D1%80%D0%BE%D0%B9%D0%BA%D0%B0_%D0%B7%D0%B0%D1%89%D0%B8%D1%82%D1%8B_%D0%B2%D0%B5%D0%B1%D1%81%D0%B5%D1%80%D0%B2%D0%B5%D1%80%D0%B0?rev=1672062877&amp;do=diff</link>
        <description>настройка защиты вебсервера

Применимость: Linux, Debian, Ubuntu

Слова для поиска: hardened

----------

Задача:

После установки системы Linux с параметрами по умолчанию ваш вебсервер будет защищен недостаточно. Есть высокая вероятность взлома защиты.</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D1%80%D0%BE%D0%B2%D0%B5%D1%80%D0%BA%D0%B0_linux-%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D1%8B_%D0%BD%D0%B0_%D0%BD%D0%B0%D0%BB%D0%B8%D1%87%D0%B8%D0%B5_%D1%81%D0%BB%D0%B5%D0%B4%D0%BE%D0%B2_%D0%B2%D0%B7%D0%BB%D0%BE%D0%BC%D0%B0?rev=1712143461&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-04-03T11:24:21+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>проверка linux-системы на наличие следов взлома</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D1%80%D0%BE%D0%B2%D0%B5%D1%80%D0%BA%D0%B0_linux-%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D1%8B_%D0%BD%D0%B0_%D0%BD%D0%B0%D0%BB%D0%B8%D1%87%D0%B8%D0%B5_%D1%81%D0%BB%D0%B5%D0%B4%D0%BE%D0%B2_%D0%B2%D0%B7%D0%BB%D0%BE%D0%BC%D0%B0?rev=1712143461&amp;do=diff</link>
        <description>проверка linux-системы на наличие следов взлома

Применимость: Linux

Слова для поиска: взломали, крякнули, хакнули, защита, безопасность

----------</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D1%80%D0%BE%D0%B2%D0%B5%D1%80%D0%BA%D0%B0_%D1%81%D0%B5%D1%80%D0%B2%D0%B5%D1%80%D0%B0_%D0%B0%D0%BD%D1%82%D0%B8%D0%B2%D0%B8%D1%80%D1%83%D1%81%D0%BD%D1%8B%D0%BC_%D0%BF%D0%BE?rev=1648825701&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-04-01T15:08:21+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Проверка сервера антивирусным ПО</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D1%80%D0%BE%D0%B2%D0%B5%D1%80%D0%BA%D0%B0_%D1%81%D0%B5%D1%80%D0%B2%D0%B5%D1%80%D0%B0_%D0%B0%D0%BD%D1%82%D0%B8%D0%B2%D0%B8%D1%80%D1%83%D1%81%D0%BD%D1%8B%D0%BC_%D0%BF%D0%BE?rev=1648825701&amp;do=diff</link>
        <description>Проверка сервера антивирусным ПО

Применимость: Debian, Linux, CentOS, Ubuntu

Слова для поиска: вирус, антивирус, antivirus

----------

Задача:

Установить антивирусные утилиты, провести проверку на вредоносный код.</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D1%80%D0%BE%D1%82%D0%B8%D0%B2%D0%BE%D0%B4%D0%B5%D0%B9%D1%81%D1%82%D0%B2%D0%B8%D0%B5_%D0%B0%D1%82%D0%B0%D0%BA%D0%B0%D0%BC_dns_amplification_ddos?rev=1648825701&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-04-01T15:08:21+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>противодействие атакам dns amplification ddos</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D1%80%D0%BE%D1%82%D0%B8%D0%B2%D0%BE%D0%B4%D0%B5%D0%B9%D1%81%D1%82%D0%B2%D0%B8%D0%B5_%D0%B0%D1%82%D0%B0%D0%BA%D0%B0%D0%BC_dns_amplification_ddos?rev=1648825701&amp;do=diff</link>
        <description>противодействие атакам dns amplification ddos

Применимость: Linux

Слова для поиска: 

----------

Задача:

Об атаках этого типа было известно еще в 2006 году, но сегодня это обретает масштабы бедствия.</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D1%80%D0%BE%D1%82%D0%B8%D0%B2%D0%BE%D0%B4%D0%B5%D0%B9%D1%81%D1%82%D0%B2%D0%B8%D0%B5_%D0%B0%D1%82%D0%B0%D0%BA%D0%B0%D0%BC_%D0%BD%D0%B0_ssh?rev=1648825701&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-04-01T15:08:21+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>противодействие атакам на ssh</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D1%80%D0%BE%D1%82%D0%B8%D0%B2%D0%BE%D0%B4%D0%B5%D0%B9%D1%81%D1%82%D0%B2%D0%B8%D0%B5_%D0%B0%D1%82%D0%B0%D0%BA%D0%B0%D0%BC_%D0%BD%D0%B0_ssh?rev=1648825701&amp;do=diff</link>
        <description>противодействие атакам на ssh

Применимость: Linux

Слова для поиска: sshd, уязвимость

----------

Задача:

OpenNET сообщает:

Третий день в Сети наблюдается массовый взлом серверов на базе Linux. Имеется подозрение, что атака совершается через неисправленную 0-day уязвимость в одном из доступных по сети сервисов. Среди взломанных систем отмечаются серверы на базе CentOS и другие дистрибутивы на основе пакетной базы RHEL 5 и 6, на которых установлены все доступные обновления. На многих взломанн…</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D1%81%D0%B5%D1%80%D0%B2%D0%B5%D1%80_%D0%BF%D0%BE%D0%BF%D0%B0%D0%BB_%D0%B2_%D1%81%D0%BF%D0%B0%D0%BC%D0%BB%D0%B8%D1%81%D1%82?rev=1648825701&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-04-01T15:08:21+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>сервер попал в спамлист</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D1%81%D0%B5%D1%80%D0%B2%D0%B5%D1%80_%D0%BF%D0%BE%D0%BF%D0%B0%D0%BB_%D0%B2_%D1%81%D0%BF%D0%B0%D0%BC%D0%BB%D0%B8%D1%81%D1%82?rev=1648825701&amp;do=diff</link>
        <description>сервер попал в спамлист

Применимость: почта, вебсервер
Слова для поиска: почта, спам, mail, spam

----------

Задача:

Вы получаете жалобы сотрудников, что при отправке почты приходят ответы почтовых служб о том, что адрес вашего сервера заблокирован по причине нахождения его в списке блокировки DNSBL.…</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D1%81%D0%BE%D0%BE%D0%B1%D1%89%D0%B5%D0%BD%D0%B8%D1%8F_%D0%BE%D0%B1_%D1%83%D1%8F%D0%B7%D0%BC%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D1%8F%D1%85_%D0%B2_%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D1%8F%D1%85?rev=1672064622&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-12-26T14:23:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>сообщения об уязвимостях в новостях</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D1%81%D0%BE%D0%BE%D0%B1%D1%89%D0%B5%D0%BD%D0%B8%D1%8F_%D0%BE%D0%B1_%D1%83%D1%8F%D0%B7%D0%BC%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D1%8F%D1%85_%D0%B2_%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D1%8F%D1%85?rev=1672064622&amp;do=diff</link>
        <description>сообщения об уязвимостях в новостях

Debian Security Debian Security

LinuxSecurity.com: Red_Hat Advisories

LinuxSecurity.com

The central voice for Linux and Open Source security news.

LinuxSecurity.com: Ubuntu Advisories</description>
    </item>
    <item rdf:about="https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D1%87%D1%82%D0%BE_%D0%B4%D0%B5%D0%BB%D0%B0%D1%82%D1%8C_%D0%B5%D1%81%D0%BB%D0%B8_%D0%B2%D0%B7%D0%BB%D0%BE%D0%BC%D0%B0%D0%BB%D0%B8?rev=1672062918&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-12-26T13:55:18+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>что делать если взломали</title>
        <link>https://wiki.colobridge.net/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D1%87%D1%82%D0%BE_%D0%B4%D0%B5%D0%BB%D0%B0%D1%82%D1%8C_%D0%B5%D1%81%D0%BB%D0%B8_%D0%B2%D0%B7%D0%BB%D0%BE%D0%BC%D0%B0%D0%BB%D0%B8?rev=1672062918&amp;do=diff</link>
        <description>что делать если взломали

----------

Задача:

Вы обнаружили вторжение на ваш сервер, что делать?

Решение:

Важно оставаться спокойным. Поспешные действия могут принести больше вреда, нежели сам взломщик.</description>
    </item>
</rdf:RDF>
