Feb 28 · 6 min read · [IMAGE: A powerful, stylized digital hammer striking an incoming 'attack' data packet, creating a shield barrier] Provisioning a cloud server for the first time is a rite of passage. If you followed m
Join discussion
Jun 15, 2025 · 6 min read · Welcome to Part 3 of the Ubuntu home lab series. Now that we have a solid base system with essential tools, it's time to focus on security. In this part, we'll: Sync time with NTP Enable automatic security updates Harden SSH Configure firewall ru...
Join discussion
Jun 6, 2025 · 2 min read · If you're managing a Linux server exposed to the internet, brute-force attacks—especially on SSH—are inevitable. That's where Fail2Ban comes to the rescue. Fail2Ban scans log files for repeated failed login attempts and bans the offending IPs by upda...
Join discussion
May 24, 2025 · 5 min read · CoLab is an innovation hub and a collaborative community for startups, innovators, creatives and entrepreneurs. They are on a mission to develop top-class tech talent in Africa. The Colab Fellowship is a 6-month programme designed to assist fellows i...
Join discussion
Mar 3, 2025 · 9 min read · Introduction In the world of server administration and cloud computing, secure remote access is of paramount importance. This blog post guides you through the entire process of setting up secure SSH (Secure Shell) access to a remote Linux server on A...
Join discussion
Mar 3, 2025 · 5 min read · Introduction In cloud environments, securing access to private networks is crucial. A Bastion Host serves as a controlled entry point for administrators to access instances within a private subnet securely. Instead of exposing all instances to the pu...
Join discussion
Jan 19, 2025 · 3 min read · 1. Set Up a Remote Linux Server on AWS Create an AWS Account: Sign up at AWS. Launch an EC2 Instance: Go to the EC2 Dashboard and click "Launch Instances." Choose an Amazon Machine Image (AMI), like Ubuntu Server or Amazon Linux. Select an insta...
Join discussion
Dec 8, 2024 · 5 min read · TL;DR. This post provides a comprehensive guide to securing and hardening an Ubuntu 24.04 LTS system. It covers essential steps such as updating the system, configuring unattended upgrades, setting up a firewall with UFW, installing Fail2Ban to preve...
Join discussion
Nov 8, 2024 · 4 min read · When managing a Linux server, security is paramount. One of the most common types of attacks servers face is brute-force attempts on login services, especially SSH. Fail2Ban is an effective, open-source tool that automatically bans suspicious IPs aft...
Join discussion