Tag: security
All the articles with the tag "security".
-
The Zero-Trust Home Lab
Apply zero-trust principles to your home lab — network segmentation, VLANs, identity-aware proxies, and Tailscale as the glue.
-
The Role of Antivirus and Endpoint Detection and Response Systems
AV vs EDR — traditional antivirus signatures vs behavioral endpoint detection. What each catches, what it misses, and what you actually need.
-
Certificate Pinning: A Secure Connection Guide
Certificate pinning locks your app to a specific TLS cert so MITM attackers can't swap in a rogue CA — how it works and when to use it.
-
Understanding the regreSSHion Vulnerability in OpenSSH
regreSSHion (CVE-2024-6387) is a remote code execution bug in OpenSSH — what it is, which versions are affected, and how to patch fast.
-
How to securely deploy Cloudflare Tunnels
Cloudflare Tunnels expose local services to the internet without open ports — secure setup with zero-trust access controls.
-
Advanced UFW Techniques: Enhancing Firewall Security
Go beyond basic UFW rules — rate limiting, geo-blocking, application profiles, logging, and before.rules tricks for serious firewall hardening.
-
UFW Basics: Setting Up Your Linux Firewall
UFW makes iptables manageable — allow and deny rules, app profiles, default policies, and the 5-minute setup for any new Linux server.
-
SSH Tunneling: A Secure Conduit for Your Data
SSH tunnels forward ports over encrypted connections — local forwarding, remote forwarding, and dynamic SOCKS proxy explained.
-
User and Group Management in Linux
Create, modify, and delete users and groups on Linux — useradd, usermod, groupadd, sudo access, and /etc/passwd explained.
-
Linux Home Lab Security: Planning for the Unexpected
Harden your home lab against real threats — SSH hardening, fail2ban, network segmentation, backups, and preparing for when things go wrong.
-
Ed25519 ssh keys
Ed25519 is faster and more secure than RSA for SSH keys — generate a key pair, add it to authorized_keys, and ditch the old RSA habits.
-
How to install Docker rootless
Install Docker in rootless mode step by step — user namespaces, subuid config, and running containers without ever touching sudo.