A 2-post collection

Securing SSH with Authy 2FA

Securing Your Server If you have servers accessible from the Internet, either hosted on the cloud or perhaps a home server that you allow incoming connections to, then you've no doubt worried about how to keep your server secure. In this post we'll demonstrate how you can quickly and easily »

Stop Brute-force attacks using IPTables

There's quite a few dedicates bits of software like SSHGuard, blockhosts, denyhosts and fail2ban that will monitor your server logs looking for suspicious activity and then block the source IP - usually though a host-based firewall. They're all fine bits of software, but basic throttling of connections is usually enough »