In a previous blog post, I wrote how to secure OpenSSH against brute force attacks. However, what if someone manages to get a shell on your system, despite all your efforts? You want to protect your…| Frederik Himpe
In a previous blog post, I wrote how to secure OpenSSH against brute force attacks. However, what if someone manages to get a shell on your system, despite all your efforts? You want to protect your system from your users doing nasty things? It is important to harden your system further according to the principle of defense in depth in order.| Frederik Himpe
Configuring Apache with mod_qos to block AI scrapers and other bad bots and scanners from crawling your website.| Frederik Himpe
Security hardening the OpenSSH server is one of the first things that should be done on any newly installed system. Brute force attacks on the SSH daemon are very common and unfortunately I see it…| Frederik Himpe
How to use the Solo V2 FIDO2 authentication key for two-factor authentication and OpenSSH| Frederik Himpe
How to mitigate security vulnerability CVE-2025-29927 in Next.js with Modsecurity web application firewall.| Frederik Himpe
How to secure your system from exploits in PHP applications by confining them with an AppArmor profile, separating different sites with AppArmor hats.| Frederik Himpe