The other day, while setting up a Linux server, I realized it was time to block Ping (ICMP requests) for security reasons. You might be wondering why disable something as basic as Ping? Well, although Ping is super useful for checking …
Read more >>Securing SSH access is crucial to prevent unauthorized logins and brute-force attacks. In this guide, I’ll share 14 essential steps that I personally use to harden SSH security on my Linux servers. 1. Disable Root Logins Logging in as root …
Read more >>Tired of entering passwords every time you SSH into your server? Or maybe you just want better security? Setting up SSH key-based authentication is the best way to secure your Linux server and log in without passwords. Here’s how you can …
Read more >>