• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • We are looking for U.S.-based freelancer or agency working with SEO or WordPress for a quick 30-min interviews to gather feedback on XOVI, a successful German SEO tool we’re looking to launch in the U.S.
    If you qualify and participate, you’ll receive a $30 Amazon gift card as a thank-you. Please apply here. Thanks for helping shape a better SEO product for agencies!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Atomic Secured Linux 2.0 RC1 Released

atomicturtle

Golden Pleskian
Atomic Secured Linux(tm) is a Unified Security solution, for Linux(tm) systems designed to protect your servers against both known and unknown threats. It is distributed through a subscription yum channel ensuring that ASL is always kept up to date. Unlike other security solutions, ASL works by combining security at all layers, from the Kernel all the way up to the application layer to provide the most complete protection available for Linux servers. ASL includes the most hardened kernel on the market, automated system hardening techniques, userspace and host Intrusion Prevention Systems (IPS), malware/rootkit detection and elimination, blacklisting technologies and web application firewalling to protect multiuser and web application hosting environments unlike no other solution. ASL is uniquely effective at addressing emerging threats posed by vulnerabilities in todays complex systems and applications, such as web hosting environments, multiuser systems, CRM's, forums, shopping carts, Content Management systems and other custom applications.


Whats new in ASL 2.0 Release Candidate 1

* Support for Fedora 8 and Fedora 9
* Added support for ClamAV, all content uploaded over the web will be scanned for malware automatically
* Added Malware Blacklist support
* Added support for creating vserver virtual servers
* Added ClamAV 0.92.2
* Added chkrootkit 0.48
* Added unhide 0.2
* Added enable/disable support for mod_evasive
* Added daily/weekly settings for web application inventory scanning
* Added disclaimer banner to ssh_checks
* Added capability to configure apache restart policy
* Added capability to define the frequency of rule updates
* Added support for monitoring OSSEC services in client mode
* Updated kernel to 2.6.24.2
* Updated rkhunter to 1.3.2
* Updated mod_security to 2.5.1


ASL is available for CentOS 3/4, Fedora 4/5/6/7/8/9, and RHEL 4/5 for a limited time price of $128/year per server. Not running one of these Operating Systems? Try our rules-only channel for mod_security and clamav updates.

For more information on getting ASL or our rules-only subscription check out, http://www.atomicrocketturtle.com/subscription.html
 
Very nice additions Scott! :) When do you expect to go live with ASL 2.0?
 
Probably in the next few weeks. I was waiting to see if we had to do anything special for 8.4. Here is a list of changes in ASL 2.0 RC2 so far (which is in asl-2.0-testing):

- Update modsec to 2.5.2
- Update Clamav to 0.93
- Update Application Inventory - detect joomla 1.0.13 - 1.5.3, coppermine 1.4.10-1.4.18
- Added Whitelist management to interface
- Added Blacklist management to interface
- Added --remove-whitelist
- Added --enable-rule (for re-enabling a disabled rule)
- Added --show-alert, for permissions restricted environments
- Added --permissions-check, safety check to validate permissions
- Added --blacklist/--remove-blacklist, ability to add IP's to firewall module
- Added --report-false positive, to automatically report a false positive to support
- Added firewall module (/etc/init.d/asl-firewall), initial featureset only covers blacklisting
- Added ability to report a false positive through the interface
- Added support for traceenable off in apache 2.2
- Added in horde vulnerability checks
- Feature Request #46, whitelists and disable rule is now togglable in the interface
- Feature Request #XX, Active configuration is now the default in the GUI
- Bugfix #XX, gui now correctly resized for updates
- Bugfix #XX, IE7 now correctly renders support portal page
- Bugfix #XX, corrected typo in asl.cron
- Bugfix #XX, test/fix web gui execute mode
- Bugfix #XX, clamav integration checks
- Bugfix #60, random permission changes with audit dir on rhel/centos 5 workaround
- Bugfix #111 (Secremote signature thing)
- Bugfix #112 (clamav and asl packages)
 
Back
Top