What is SSH? SSH is an abbreviation for Secure SHell. Secure is for secure; and what is secure with SSH? The connection to a remote computer. Because SSH is a communication protocol that encrypts the connection between two computers. A SHell is a user interface Often a console, a command line interpreter (CLI), but it can be […]
This comprehensive guide will walk you through the process of using shell scripts to transfer files securely using SFTP (Secure File Transfer Protocol) on UNIX and UNIX-like systems. We’ll cover everything from basic SFTP usage to advanced automation techniques, ensuring you have the knowledge to implement secure, efficient file transfers in your workflows. Understanding SFTP […]
DenyHosts monitors server logs and bans ips that exceed a certain number of failed logins. It is an effective security tool, written in python, this software helps to prevent brute force attacks on a virtual server. Install DenyHosts sudo rpm -Uvh http://mirror.metrocast.net/fedora/epel/6/i386/epel-release-6-8.noarch.rpm sudo yum install denyhosts Whitelist IP Addresses Edit the file : hosts.allow nano /etc/hosts.allow […]
It is recommended to change SSH password of your server, to avoid attacks and hacking your server. Yesterday, I’ve been notified by my Hosting company that I was subject of Brute force attacks. More than failed brute force attacks registered on my server after my last successful login. How to change the password Simply, login […]