Explore >> Select a destination


You are here

cromwell-intl.com
| | peterme.net
3.1 parsecs away

Travel
| | [AI summary] This article provides a step-by-step guide on setting up a secure Nim server with Linux, including firewall configuration, user management, reverse proxy setup with Nginx, and HTTPS implementation using Let's Encrypt.
| | golb.hplar.ch
1.9 parsecs away

Travel
| | [AI summary] The user has followed a comprehensive guide to secure and configure their VPS server. They have successfully set up SSH with key-based authentication, disabled root login, configured a firewall, and set up a non-root user for system management. The guide also covers changing the SSH port, disabling SSH protocol 1, and setting up SSH agent for passwordless login. The user is now ready to deploy additional services and applications on their secure server.
| | gavinhoward.com
2.3 parsecs away

Travel
| | I recently started managing my own server, and I made a few security mistakes. This post contains the lessons I learned.
| | rogs.me
10.9 parsecs away

Travel
|