|
You are here |
www.danieldemmel.me | ||
| | | | |
golb.hplar.ch
|
|
| | | | | [AI summary] The user has followed a comprehensive guide to secure and configure their VPS server. They have successfully set up SSH with key-based authentication, disabled root login, configured a firewall, and set up a non-root user for system management. The guide also covers changing the SSH port, disabling SSH protocol 1, and setting up SSH agent for passwordless login. The user is now ready to deploy additional services and applications on their secure server. | |
| | | | |
hjr265.me
|
|
| | | | | To test some of Toph's IP-based access control features, I needed to access it from a few different IP addresses than mine. I thought I finally needed to get one of those VPN subscriptions YouTube content creators keep rambling about. Fortunately, I remembered an easier way to do this. You see, it is possible to run a SOCKS proxy that tunnels your connection over SSH. And it is built right into the ssh command: | |
| | | | |
gavinhoward.com
|
|
| | | | | I recently started managing my own server, and I made a few security mistakes. This post contains the lessons I learned. | |
| | | | |
blog.oxplot.com
|
|
| | | [AI summary] The author details their experience with setting up a WireGuard VPN on Android to bypass DNS issues with Telstra's mobile service, highlighting its simplicity and reliability compared to other VPN solutions. | ||