In a previous blog post, I wrote how to secure OpenSSH against brute force attacks. However, what if someone manages to get a shell on your system, despite all your efforts? You want to protect your…| Frederik Himpe
In a previous blog post, I wrote how to secure OpenSSH against brute force attacks. However, what if someone manages to get a shell on your system, despite all your efforts? You want to protect your system from your users doing nasty things? It is important to harden your system further according to the principle of defense in depth in order.| Frederik Himpe
How to configure a dual stack IPv4 and IPv6 Wireguard VPN gateway with systemd-networkd and the Foomuuri NFTables firewall on Debian GNU/Linux.| Frederik Himpe
Configure a Wireguard VPN tunneling IPv6 traffic on Linux by setting up an NDP proxy with Shorewall.| Frederik Himpe
How to use the Solo V2 FIDO2 authentication key for two-factor authentication and OpenSSH| Frederik Himpe
Tutorial explaining how to configure the Foomuuri firewall on Debian GNU/Linux to filter incoming and outgoing connections| Frederik Himpe