|
You are here |
justinmiller.io | ||
| | | | |
golb.hplar.ch
|
|
| | | | | [AI summary] The user has followed a comprehensive guide to secure and configure their VPS server. They have successfully set up SSH with key-based authentication, disabled root login, configured a firewall, and set up a non-root user for system management. The guide also covers changing the SSH port, disabling SSH protocol 1, and setting up SSH agent for passwordless login. The user is now ready to deploy additional services and applications on their secure server. | |
| | | | |
colincogle.name
|
|
| | | | | SSH is easy to secure, but that doesn't mean there isn't more work to be done. | |
| | | | |
materials.rangeforce.com
|
|
| | | | | SSH (secure shell) is a widely-used protocol for remote administration of Unix and Linux servers. The default configuration of many SSH server implementations includes several potentially-insecure settings so as to maintain compatibility with outdated client software. The ssh-audit tool can be used to check the server settings and recommend changes so as to improve security. | |
| | | | |
lukasrotermund.de
|
|
| | | In this article, I explain why I replaced NGINX with Caddy as the reverse proxy on the host machine and in the Docker image. | ||