February 2017
« Jan    

How to avoid unknown security logic flow in Web application


MySQL security flow

Recently I had to work with a HIPPA complaint project and so we will be more conscious about web and application security. I have covered the server security by limit the public access port and installation certain tools like apf, bfd to avoid Web DDoS attack and will be easy since [...]

Configuring reverse proxy on IIS7


One of my task requires to publish a web application which running on a diff. port need to be accessed from outside but securely. Most of the people simply open the application port added in firewall to get this done. Unfortunately my requirement does not allow to do that.

So I need to use [...]

Monitoring JVM runtime statistics on JAVA application

One of the recent application release starting to keep the server load high after few hours of run and we are getting similar errors in log file [ My webserver is Glassfish Community version Build 5]

Interrupting idle Thread: http-thread-pool-443. To start further investigation, I would prefer to check the JVM consumption and would [...]

Verifying the Email server reputation : RDNS, SPF and DKIM Keys


Recently I’d setup a bulk email server using Postfix MTA and optimize the postfix variables for huge email delivery. I uses sql based database for storing smtp logins. So that we can use this server to send bulk email from anywhere like does. My Major setup including the following area,

1. SQL based [...]

Nagios : Enabling FREE SMS notification [INDIA]

Here I found some good trick to enable Nagios sms notification free for Indian users using one of the sms free service offered by way2sms website. have a look at

Most of the cases I used to take tiny pieces of information from different blog sites and customize and modify it for my purpose. [...]

Lightsquid : Monitoring SQUID users

Recently I was trying to use pfesence which would more easy to configure and does support transparent squid proxy. I had tried to setup different time slot to different group with different categories to set some policy to access internet. But I got fewer luck and seems that the access list we set earlier was [...]