Tagged articles
12 articles
Page 1 of 1
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Nov 18, 2025 · Operations

How to Stop Brute‑Force Logins with Nginx Rate Limiting

Learn how to protect your web application from brute‑force login attacks by configuring Nginx rate limiting, with step‑by‑step instructions, example configurations, testing methods, custom error pages, and best‑practice tips such as IP whitelisting, HTTPS enforcement, and complementary security measures.

Brute-force protectionNginxrate limiting
0 likes · 8 min read
How to Stop Brute‑Force Logins with Nginx Rate Limiting
Liangxu Linux
Liangxu Linux
Sep 28, 2025 · Information Security

Hardening SSH on Linux: Practical Defenses Against Brute‑Force Attacks

This guide explains why SSH brute‑force attacks threaten Linux servers and provides a step‑by‑step hardening checklist—including changing the default port, disabling root login, using key‑based authentication, deploying automatic block tools, setting IP whitelists, and regularly analyzing logs—to dramatically improve server security.

Brute-force protectionDenyHostsFail2ban
0 likes · 5 min read
Hardening SSH on Linux: Practical Defenses Against Brute‑Force Attacks
Top Architect
Top Architect
Sep 20, 2025 · Information Security

How to Secure Login APIs: Prevent Brute‑Force, CAPTCHA, IP Blocking, and MITM Attacks

This article explains common security risks of login interfaces such as brute‑force attacks, CAPTCHA bypass, IP‑based rate limiting, mobile verification, and man‑in‑the‑middle threats, and provides practical mitigation techniques including code examples, HTTPS adoption, and additional hardening measures.

Brute-force protectionCaptchaHTTPS
0 likes · 13 min read
How to Secure Login APIs: Prevent Brute‑Force, CAPTCHA, IP Blocking, and MITM Attacks
Java Captain
Java Captain
Sep 20, 2025 · Information Security

How to Secure Login APIs: Prevent Brute‑Force, MITM, and Abuse

This article explains common security risks in login interfaces—such as brute‑force attacks, captcha bypass, account and IP lockouts, man‑in‑the‑middle threats—and provides practical mitigation techniques like password attempt limits, captcha, phone verification, HTTPS, and comprehensive logging.

Brute-force protectionCaptchaHTTPS
0 likes · 9 min read
How to Secure Login APIs: Prevent Brute‑Force, MITM, and Abuse
Architecture Digest
Architecture Digest
Sep 18, 2025 · Information Security

How to Harden Login APIs: From Brute‑Force to MITM Protection

This article examines common login security risks such as brute‑force attacks, captcha bypass, IP blocking, and man‑in‑the‑middle threats, and proposes layered defenses including password‑retry limits, captcha, phone verification, HTTPS, and encrypted payloads to significantly raise the attack cost.

Brute-force protectionCaptchaHTTPS
0 likes · 10 min read
How to Harden Login APIs: From Brute‑Force to MITM Protection
Liangxu Linux
Liangxu Linux
Jul 21, 2025 · Information Security

Stop SSH Brute‑Force Attacks: 4 Hardening Techniques with Fail2ban and Key Authentication

This guide explains four practical ways to protect a Linux server from SSH brute‑force attacks—using complex passwords, changing the default port, disabling direct root login, and enabling public‑key authentication—plus detailed steps to install and configure Fail2ban for automatic IP blocking.

Brute-force protectionLinux securityPublic Key Authentication
0 likes · 9 min read
Stop SSH Brute‑Force Attacks: 4 Hardening Techniques with Fail2ban and Key Authentication
MaGe Linux Operations
MaGe Linux Operations
May 8, 2025 · Information Security

4 Proven Ways to Stop SSH Brute‑Force Attacks (with Fail2ban Guide)

This article explains four effective techniques to protect SSH from brute‑force attacks—including strong passwords, changing the default port, using non‑root privileged users, and key‑based authentication—followed by detailed examples of configuration changes, Fail2ban installation, jail setup, testing, and IP unbanning procedures.

Brute-force protectionFail2banSSH Security
0 likes · 11 min read
4 Proven Ways to Stop SSH Brute‑Force Attacks (with Fail2ban Guide)
MaGe Linux Operations
MaGe Linux Operations
Dec 12, 2021 · Information Security

How to Stop Brute‑Force SSH Attacks on Your Raspberry Pi

This article explains how a Raspberry Pi exposed to the Internet was repeatedly attacked via SSH, how the author identified the brute‑force attempts in /var/log/auth.log, and step‑by‑step methods using hosts.allow/deny and ufw to whitelist trusted IPs and block malicious traffic.

Brute-force protectionLinux securityRaspberry Pi
0 likes · 5 min read
How to Stop Brute‑Force SSH Attacks on Your Raspberry Pi
Programmer DD
Programmer DD
May 9, 2021 · Information Security

How to Secure Login APIs: Defending Against Brute‑Force, MITM, and More

This article explains practical security measures for login interfaces, covering brute‑force attacks, captcha integration, IP throttling, mobile verification, man‑in‑the‑middle protection with HTTPS, and additional best‑practice recommendations to harden web back‑end authentication.

Brute-force protectionCaptchaHTTPS
0 likes · 10 min read
How to Secure Login APIs: Defending Against Brute‑Force, MITM, and More
ITPUB
ITPUB
Jul 9, 2016 · Information Security

How to Harden SSHD Against Brute‑Force Attacks with Fail2Ban

This tutorial walks through the practical steps to protect an SSH daemon from brute‑force attacks by enforcing strong passwords, changing the default port, disabling root logins, and configuring Fail2Ban to automatically ban malicious IPs, complete with command‑line examples and configuration details.

Brute-force protectionFail2banLinux security
0 likes · 12 min read
How to Harden SSHD Against Brute‑Force Attacks with Fail2Ban