Look at many of the large scale data breaches in the news -- the companies often did not discover the data leak or intrusion until long after the bad-actors were gone.Contrary to popular belief, bad-actors don't always want to change something or lock you out of your data f...
Look at many of the large scale data breaches in the news -- the companies often did not discover the data leak or intrusion until long after the bad-actors were gone.Contrary to popular belief, bad-actors don't always want to change something or lock you out of your data ...
I figured I'd put it online to hopefully help others learn, and save time.I've never found one guide that covers everything -- this guide is my attempt.Many of the things covered in this guide may be rather basic/trivial, but most of us do not install Linux every day, and it is...
At a high level, the second a device, like a server, is in the public domain -- i.e. visible to the outside world -- it becomes a target for bad-actors. An unsecured device is a playground for bad-actors who want access to your data, or to use your server as another ...
Look at many of the large scale data breaches in the news -- the companies often did not discover the data leak or intrusion until long after the bad-actors were gone.Contrary to popular belief, bad-actors don't always want to change something or lock you out of your data for money. ...
At a high level, the second a device, like a server, is in the public domain -- i.e visible to the outside world -- it becomes a target for bad-actors. An unsecured device is a playground for bad-actors who want access to your data, or to use your server as another node for ...
This guide may appear duplicative/unnecessary because there are countless articles online that tell you how to secure Linux, but the information is spread across different articles, that cover different things, and in different ways. Who has time to scour through hundreds of articles?
Look at many of the large scale data breaches in the news -- the companies often did not discover the data leak or intrusion until long after the bad-actors were gone.Contrary to popular belief, bad-actors don't always want to change something or lock you out of your data for money. ...
From the computer you're going to use to connect to your server, the client, not the server itself, create an Ed25519 key with ssh-keygen: ssh-keygen -t ed25519 Generating public/private ed25519 key pair. Enter file in which to save the key (/home/user/.ssh/id_ed25519): Created ...
At a high level, the second a device, like a server, is in the public domain -- i.e visible to the outside world -- it becomes a target for bad-actors. An unsecured device is a playground for bad-actors who want access to your data, or to use your server as another node for ...