With the exponential growth of the Internet, a central Whois database that
provides host and network information of systems connected to the Internet,
and electronic mail (email) addresses of the users of those systems has
proven to be very inefficient. The sheer size and effort needed to maintain
a centralized database necessitates an alternate, decentralized approach to
storing and retrieving this information.
RWhois is a Directory Services protocol which extends and enhances the Whois
concept in a hierarchical and scaleable fashion. It focuses on the
distribution of "network objects"--the data representing Internet resources
or people--and uses the inherently hierarchical nature of these network
objects (domain names, Internet Protocol (IP) networks, email addresses) to
more accurately discover the requested information.
RWhois synthesizes concepts from other, established Internet protocols to
create a more useful way to find resources across the Internet. The RWhois
protocol and architecture derive a great deal of structure from the Domain
Name System (DNS) [RFC 1034] and borrow directory service concepts from
other directory service efforts, primarily [X.500]. The protocol is also
influenced by earlier established Internet protocols, such as the Simple
Mail Transport Protocol (SMTP) [RFC 821] for response codes.
LWPx::ParanoidAgent is a class subclassing LWP::UserAgent, but
paranoid against attackers. It's to be used when you're fetching
a remote resource on behalf of a possibly malicious user.
This class can do whatever LWP::UserAgent can (callbacks, uploads
from files, etc), except proxy support is explicitly removed, because
in that case you should do your paranoia at your proxy.
Also, the schemes are limited to http and https, which are mapped to
LWPx::Protocol::http_paranoid and LWPx::Protocol::https_paranoid,
respectively, which are forked versions of the same ones without
the "_paranoid". Subclassing them didn't look possible, as they were
essentially just one huge function.
This class protects you from connecting to internal IP ranges
(unless you whitelist them), hostnames/IPs that you blacklist, remote
webserver tarpitting your process (the timeout parameter is changed to
be a global timeout over the entire process), and all combinations of
redirects and DNS tricks to otherwise tarpit and/or connect to internal
resources.
From the SquidClamav homepage:
SquidClamav is an antivirus for Squid proxy based on the Awards winnings
ClamAv anti-virus toolkit. Using it will help you securing your home or
enterprise network web traffic. SquidClamav is the most efficient Squid
Redirector and ICAP service antivirus tool for HTTP traffic available for
free, it is written in C and can handle thousand of connections. The way
to add more securing on your network for free is here.
SquidClamav is build for speed and security in mind, it is first used
and tested to secure a network with 2,500 and more users. It is also known
to working fast with 15000+ users.
With SquidClamav You have full control of what kind of HTTP stream must be
scanned by Clamav antivirus, this control operate at 3 different levels:
- At URL level, you can disable virus scanning for a set of web site,
filename extension or anything that can be matched in an URL.
- At client side by disabling virus scan and other redirector call
to a set of username, source Ip addresses or computer DNS name.
- At HTTP header level, where you can disable virus scanning following
the content type or file size.