|
You are here |
cromwell-intl.com | ||
| | | | |
peterme.net
|
|
| | | | | [AI summary] This article provides a step-by-step guide on setting up a secure Nim server with Linux, including firewall configuration, user management, reverse proxy setup with Nginx, and HTTPS implementation using Let's Encrypt. | |
| | | | |
golb.hplar.ch
|
|
| | | | | [AI summary] The user has followed a comprehensive guide to secure and configure their VPS server. They have successfully set up SSH with key-based authentication, disabled root login, configured a firewall, and set up a non-root user for system management. The guide also covers changing the SSH port, disabling SSH protocol 1, and setting up SSH agent for passwordless login. The user is now ready to deploy additional services and applications on their secure server. | |
| | | | |
gavinhoward.com
|
|
| | | | | I recently started managing my own server, and I made a few security mistakes. This post contains the lessons I learned. | |
| | | | |
rogs.me
|
|
| | | |||