There a multiple use cases to run a script on login. Configuration, starting services, logging, sending a notification, and so on. I want to show you different ways to do so. Example script The examp| ITTavern.com
To make it quick, I wish I had known about port forwarding and tunneling earlier. With this blog post, I try to understand it better myself and share some experiences and tips with you. Topics: use ca| ITTavern.com
Disclaimer: Please read the whole post before you start. This will help you avoid a lock-out Generating a secure key pair SSH keys use asymmetric cryptographic algorithms that generate a pair of se| ITTavern.com
There is no trash can for the Linux CLI. rm removes the data permanently, and there is practically no way of recovering deleted files reliably. trash-cli fills this role and lets you 'trash' files and| ITTavern.com
There are various implementations. I am using nmap-ncat on rockOS 8 on both hosts. Netcat's using TCP by default and this test is not limited by disk I/O from what I understood. That said, it is not| ITTavern.com
rsync is a CLI tool that covers various use cases. Transfering data, creating backups or archives, mirroring data sets, integrity checks, and many more. Reference for this article: rsync version 3.2.| ITTavern.com
In this article, I'll use Ubuntu 22.04 (Debian-derivative) and rockyOS 9.2 (RHEL-derivative) as references. If it is not mentioned, commands are the same for both systems. Basics # Cron jobs are sched| ITTavern.com
Port knocking is like a secret handshake or magic word between client and server. It can be used in various ways, but most commonly as a security feature to deny all contact to a specific service - li| ITTavern.com
I want to show you how to get started with Fail2Ban to keep your Linux servers more secure. For this blog post, I've used Ubuntu 22.04 LTS as a reference and will use it to secure my SSH service with| ITTavern.com
Restricts the following declarations (up to the next| man.openbsd.org
This is an updated version from last year. Thank you for the great feedback! This article covers mainly the configuration of the SSH service and only references ways to protect the service on the hos| ITTavern.com