Tagged articles
335 articles
Page 1 of 4
Ops Community
Ops Community
May 4, 2026 · Information Security

Investigating and Securing a Server After a Suspicious Login

When a production server shows unexpected high CPU usage and unknown login activity, this guide walks Linux ops engineers through confirming intrusion, stopping the attacker, tracing the attack path, removing backdoors, restoring system integrity, and applying hardening measures to prevent future breaches.

ForensicsHardeningLinux
0 likes · 27 min read
Investigating and Securing a Server After a Suspicious Login
MaGe Linux Operations
MaGe Linux Operations
Apr 30, 2026 · Information Security

20 Essential Server Hardening Steps Before Launching a New Machine

This guide provides a detailed 20‑item checklist for Linux server hardening—covering snapshots, account management, SSH key authentication, password policies, firewall rules, service reduction, kernel tweaks, logging, and verification scripts—to ensure a new production server is secure before it goes live.

AIDEAuditdFail2ban
0 likes · 33 min read
20 Essential Server Hardening Steps Before Launching a New Machine
MaGe Linux Operations
MaGe Linux Operations
Apr 26, 2026 · Information Security

How to Harden SSH Securely Without Locking Yourself Out

This guide explains why the default SSH configuration is vulnerable, walks through protocol basics, key generation, server hardening settings, step‑by‑step procedures to avoid being locked out, key management best practices, troubleshooting tips, and provides a complete hardening script for Linux systems.

Configuration ManagementFail2banHardening
0 likes · 25 min read
How to Harden SSH Securely Without Locking Yourself Out
Lin is Dream
Lin is Dream
Mar 26, 2026 · Information Security

Detect and Fix the Critical Apifox Remote Code Execution Vulnerability

This article explains the high‑severity remote code execution and data‑theft flaw discovered in Apifox, outlines how malicious scripts can steal SSH keys, Git credentials and shell history, and provides step‑by‑step Mac and Windows commands for self‑inspection and comprehensive remediation.

ApifoxGitRemediation
0 likes · 7 min read
Detect and Fix the Critical Apifox Remote Code Execution Vulnerability
Data STUDIO
Data STUDIO
Mar 24, 2026 · Backend Development

7 Python Libraries That Can Transform Your Network Programming

This article reviews seven Python libraries—trio, asyncssh, zeroconf, dpkt, socketify.py, pynetdicom, and mitmproxy—explaining their core features, providing code examples, and showing how each abstracts low‑level networking complexities to enable faster, more reliable network applications.

Async IODICOMNetwork programming
0 likes · 15 min read
7 Python Libraries That Can Transform Your Network Programming
Java Architect Essentials
Java Architect Essentials
Mar 21, 2026 · Operations

Turn a Raspberry Pi Zero W into a Mini Web Server: Complete Step‑by‑Step Guide

This guide walks you through the entire process of setting up a Raspberry Pi Zero W—from understanding the hardware and its specifications, flashing Raspbian Stretch Lite, configuring SSH and Wi‑Fi, optimizing the system, installing Nginx, to exposing the server publicly via ngrok—providing all commands, configuration files, and troubleshooting tips.

IoTLinuxNGINX
0 likes · 14 min read
Turn a Raspberry Pi Zero W into a Mini Web Server: Complete Step‑by‑Step Guide
IT Services Circle
IT Services Circle
Mar 15, 2026 · Operations

8 Must‑Try SSH Clients for Faster Server Management – Compare & Choose

This guide reviews eight popular SSH/terminal tools—from free open‑source options to enterprise‑grade clients—detailing their platforms, key features, pricing models, and ideal user groups, and provides a concise comparison table and quick‑pick recommendations to help you select the right solution for your workflow.

Remote ManagementSSHTool comparison
0 likes · 9 min read
8 Must‑Try SSH Clients for Faster Server Management – Compare & Choose
ShiZhen AI
ShiZhen AI
Mar 12, 2026 · Operations

The Lifesaving Backup Trick 99% of OpenClaw Users Miss

This guide shows how to protect your OpenClaw configuration by treating the ~/.openclaw directory as a snapshot, using a private GitHub repository for secure, versioned backups that let you roll back, recover from loss, or migrate to a new machine in minutes.

AutomationBackupGit
0 likes · 14 min read
The Lifesaving Backup Trick 99% of OpenClaw Users Miss
MaGe Linux Operations
MaGe Linux Operations
Mar 11, 2026 · Information Security

How to Harden Linux Servers: A Step‑by‑Step Guide to Secure SSH, Accounts, Firewalls, and Auditing

This comprehensive guide walks you through Linux host hardening by explaining the security baseline, detailing default configurations, highlighting common pitfalls, and providing concrete, verifiable adjustments for account policies, SSH, firewalls, kernel parameters, file permissions, and audit logging, complete with scripts, examples, and real‑world case studies.

AuditdHardeningLinux
0 likes · 40 min read
How to Harden Linux Servers: A Step‑by‑Step Guide to Secure SSH, Accounts, Firewalls, and Auditing
Coder Trainee
Coder Trainee
Feb 28, 2026 · Operations

Common Jenkins Errors and Step-by-Step Fixes

This guide lists frequent Jenkins problems such as missing libXrender.so.1 and SSH transferring zero files, explains why they occur, and provides exact yum commands, path-adjustment tips, and shell-parameter checks to resolve them.

JenkinsSSHci/cd
0 likes · 4 min read
Common Jenkins Errors and Step-by-Step Fixes
MaGe Linux Operations
MaGe Linux Operations
Feb 8, 2026 · Operations

Mastering SSH Hardening: From Port Changes to Certificate Authentication

This comprehensive guide walks you through securing SSH on Linux servers by changing the default port, disabling root and password logins, enforcing key‑based authentication, configuring fail2ban, using ProxyJump for multi‑hop access, managing keys at scale, and applying best‑practice hardening techniques.

ConfigurationFail2banHardening
0 likes · 46 min read
Mastering SSH Hardening: From Port Changes to Certificate Authentication
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 7, 2026 · Operations

Essential Linux Remote Data Sync with Rsync: A Complete Guide

This article explains how to use rsync for fast, incremental file synchronization over LAN/WAN, covering its algorithm, supported platforms, command‑line options, SSH and daemon modes, detailed configuration parameters, and real‑time syncing with inotify‑tools.

LinuxOperationsSSH
0 likes · 20 min read
Essential Linux Remote Data Sync with Rsync: A Complete Guide
Top Architect
Top Architect
Jan 20, 2026 · Operations

Turn a Raspberry Pi Zero W into a Mini Web Server with SSH and Ngrok

This guide explains what a Raspberry Pi Zero W is, lists its hardware specs, walks through downloading and flashing Raspbian Lite, enabling head‑less SSH and Wi‑Fi, configuring apt sources, installing and testing nginx, and exposing the server to the internet via an ngrok tunnel.

Raspberry PiSSHSystem Setup
0 likes · 15 min read
Turn a Raspberry Pi Zero W into a Mini Web Server with SSH and Ngrok
Java Tech Enthusiast
Java Tech Enthusiast
Dec 30, 2025 · Operations

5 Best Terminal Clients to Replace PuTTY in 2026 – Features, Pros & Scores

As PuTTY ages, this guide evaluates five contemporary terminal clients—Windows Terminal, MobaXterm, Tabby, Termius, and KiTTY—detailing their core advantages, drawbacks, ideal use cases, and personal scores, helping network engineers choose the most efficient, modern replacement for remote management in 2026.

Remote ManagementSSHTool comparison
0 likes · 11 min read
5 Best Terminal Clients to Replace PuTTY in 2026 – Features, Pros & Scores
Raymond Ops
Raymond Ops
Dec 29, 2025 · Information Security

7 Proven Ways to Harden SSH and Block Brute‑Force Attacks

A senior operations engineer shares seven battle‑tested techniques—including port masking, key‑based authentication, Fail2ban, IP whitelisting, connection limits, two‑factor authentication, and a honeypot—to dramatically reduce SSH brute‑force attacks and protect critical servers.

2FAFail2banSSH
0 likes · 13 min read
7 Proven Ways to Harden SSH and Block Brute‑Force Attacks
Raymond Ops
Raymond Ops
Dec 18, 2025 · Information Security

Build an Impenetrable Linux Server: Step‑by‑Step Security Hardening Guide

This comprehensive guide walks you through real‑world intrusion analysis and a multi‑layered hardening strategy for Linux servers, covering SSH security, Fail2Ban, firewalls, iptables, IDS, file integrity monitoring, automated alerts, emergency response, and advanced techniques to create a robust defense.

Fail2banHardeningIDS
0 likes · 15 min read
Build an Impenetrable Linux Server: Step‑by‑Step Security Hardening Guide
Top Architect
Top Architect
Dec 17, 2025 · Operations

Turn a Raspberry Pi Zero W into a Tiny Web Server with SSH and Ngrok

This guide explains how to set up a Raspberry Pi Zero W as a miniature Linux server, flash Raspbian Stretch Lite onto an SD card, enable headless SSH access, configure Wi‑Fi, install and run Nginx, and expose the service to the public internet using Ngrok, while also covering useful system optimizations.

LinuxNGINXRaspberry Pi
0 likes · 14 min read
Turn a Raspberry Pi Zero W into a Tiny Web Server with SSH and Ngrok
Efficient Ops
Efficient Ops
Dec 14, 2025 · Information Security

Detect and Respond to Linux Server Intrusions with Log Analysis

This guide walks you through using Linux log tools such as last, lastb, grep, and sshd_config to identify suspicious logins, trace malicious IPs, and apply immediate remediation steps for compromised servers, targeting ops engineers and developers.

ForensicsLinuxSSH
0 likes · 8 min read
Detect and Respond to Linux Server Intrusions with Log Analysis
Xiao Liu Lab
Xiao Liu Lab
Dec 11, 2025 · Operations

Master SSH: From Basic Connections to Secure, High‑Performance Remote Workflows

This guide explains how SSH evolved from simple remote login to a comprehensive tool for secure server access, efficient command execution, password‑less authentication, advanced configuration, port forwarding for deep‑learning tasks, large‑file transfer strategies, and enterprise‑grade hardening, empowering developers and ops engineers to build reliable, reproducible workflows.

Deep LearningLinuxRemote Development
0 likes · 10 min read
Master SSH: From Basic Connections to Secure, High‑Performance Remote Workflows
Xiao Liu Lab
Xiao Liu Lab
Nov 26, 2025 · Information Security

Why SecureCRT Fails on New Linux and How to Fix It

After upgrading to recent Linux distributions, SecureCRT often cannot establish SSH connections due to disabled legacy algorithms, but the issue can be resolved by updating SecureCRT or manually enabling modern key‑exchange and host‑key types in its settings.

LinuxSSHSecureCRT
0 likes · 4 min read
Why SecureCRT Fails on New Linux and How to Fix It
Xiao Liu Lab
Xiao Liu Lab
Nov 5, 2025 · Information Security

Stop SSH Brute‑Force Attacks: 5 Ready‑to‑Use Scripts to Harden Your Server

The article reveals how thousands of SSH brute‑force attempts target servers daily, explains why password‑based root logins are a critical risk, and provides five practical Bash scripts—analysis, auto‑banning, security checks, user audits, and daily reporting—to quickly fortify SSH defenses.

LinuxSSHSecurity Scripts
0 likes · 10 min read
Stop SSH Brute‑Force Attacks: 5 Ready‑to‑Use Scripts to Harden Your Server
Open Source Linux
Open Source Linux
Nov 1, 2025 · Operations

Top 32 SSH Interview Questions Every Linux Cloud Engineer Must Master

This comprehensive guide covers 32 high‑frequency SSH interview questions, from basic concepts and key management to advanced tunneling, performance tuning, and enterprise‑level security practices, providing detailed answers, best‑practice configurations, and code examples for Linux cloud environments.

LinuxSSHSecurity
0 likes · 42 min read
Top 32 SSH Interview Questions Every Linux Cloud Engineer Must Master
Raymond Ops
Raymond Ops
Oct 11, 2025 · Information Security

Master Linux Firewall & SSH: Step‑by‑Step Guide to Secure Web Server Access

This tutorial walks through configuring a Linux firewall and web server, setting up network interfaces across four virtual machines, enabling NAT, defining DMZ zones, securing SSH on a non‑standard port, and verifying connectivity, providing a comprehensive hands‑on guide for robust network security.

CentOSLinuxSSH
0 likes · 7 min read
Master Linux Firewall & SSH: Step‑by‑Step Guide to Secure Web Server Access
Top Architect
Top Architect
Oct 10, 2025 · Operations

Turn a Raspberry Pi Zero W into a Mini Web Server with SSH and Ngrok

This step‑by‑step guide shows how to choose a Raspberry Pi Zero W, flash Raspbian Stretch Lite onto a micro‑SD card, enable headless SSH, configure Wi‑Fi, install and run Nginx, and expose the server to the internet using Ngrok, all while keeping the device compact and efficient.

LinuxRaspberry PiSSH
0 likes · 13 min read
Turn a Raspberry Pi Zero W into a Mini Web Server with SSH and Ngrok
Raymond Ops
Raymond Ops
Oct 5, 2025 · Operations

Master Jenkins Automated Deployment: From Code Commit to Live Release

This article provides a step‑by‑step guide to setting up Jenkins for automated CI/CD, covering pipeline workflow, installation, required plugins, global tool configuration, Gitee and SSH integration, Maven project setup, post‑build deployment scripts, and how to run and verify builds.

JenkinsSSHci/cd
0 likes · 22 min read
Master Jenkins Automated Deployment: From Code Commit to Live Release
Raymond Ops
Raymond Ops
Oct 1, 2025 · Information Security

Master SSH Remote Login: Protocol Basics, Commands, and Security Best Practices

This comprehensive guide explains SSH fundamentals, protocol types, advantages, client and server software, public‑key exchange, configuration files, command usage, best‑practice hardening, and password‑less authentication, providing Linux administrators with the essential knowledge to securely manage remote systems.

LinuxRemote accessSSH
0 likes · 17 min read
Master SSH Remote Login: Protocol Basics, Commands, and Security Best Practices
Liangxu Linux
Liangxu Linux
Sep 28, 2025 · Information Security

Hardening SSH on Linux: Practical Defenses Against Brute‑Force Attacks

This guide explains why SSH brute‑force attacks threaten Linux servers and provides a step‑by‑step hardening checklist—including changing the default port, disabling root login, using key‑based authentication, deploying automatic block tools, setting IP whitelists, and regularly analyzing logs—to dramatically improve server security.

Brute-force protectionDenyHostsFail2ban
0 likes · 5 min read
Hardening SSH on Linux: Practical Defenses Against Brute‑Force Attacks
Raymond Ops
Raymond Ops
Sep 25, 2025 · Information Security

Boost Linux Security: Essential Hardening Steps for RHEL 7

This guide walks through practical Linux security hardening on RHEL 7, covering account locking, password policies, SELinux activation, SSH port changes, firewall minimization, immutable system files, and other measures to elevate the system to a higher security level.

LinuxPassword policyRHEL7
0 likes · 13 min read
Boost Linux Security: Essential Hardening Steps for RHEL 7
Liangxu Linux
Liangxu Linux
Sep 22, 2025 · Information Security

Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide

This comprehensive guide walks you through real‑world intrusion case analysis, multi‑layer defense strategies—including SSH hardening, Fail2Ban, firewall rules, IDS deployment, file integrity monitoring, advanced techniques like port knocking and honeypots—and incident response procedures, providing concrete commands and scripts to secure a Linux server from end to end.

Fail2banHardeningIDS
0 likes · 13 min read
Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide
MaGe Linux Operations
MaGe Linux Operations
Sep 16, 2025 · Information Security

Master Linux Security Hardening: Practical Scripts & Best Practices

This comprehensive guide walks you through Linux security threats, three-layer defense strategies, user account hardening, SSH and firewall configuration, file system protection, service hardening, kernel tuning, automated monitoring, incident response, and a step‑by‑step implementation roadmap to build a resilient, multi‑layered defense system.

SSHfirewallsecurity hardening
0 likes · 26 min read
Master Linux Security Hardening: Practical Scripts & Best Practices
MaGe Linux Operations
MaGe Linux Operations
Sep 6, 2025 · Information Security

10 Proven SSH Hardening Techniques to Stop Bruteforce Attacks

This guide shares ten battle‑tested methods for hardening SSH, from changing the default port and disabling root login to using key authentication, fail2ban, IP whitelisting, two‑factor authentication, bastion hosts, and automated monitoring, helping you build a multilayered defense against brute‑force attacks.

HardeningSSHbrute force
0 likes · 23 min read
10 Proven SSH Hardening Techniques to Stop Bruteforce Attacks
Java Tech Enthusiast
Java Tech Enthusiast
Sep 6, 2025 · Backend Development

Build a Web SSH Client with Spring Boot: From Architecture to Code

This tutorial walks through creating a browser‑based SSH client using Spring Boot, JSch, WebSocket, and Xterm.js, covering application scenarios, system architecture, backend and frontend implementation, file transfer features, database setup, performance tuning, and security best practices.

Backend DevelopmentJavaSSH
0 likes · 32 min read
Build a Web SSH Client with Spring Boot: From Architecture to Code
Liangxu Linux
Liangxu Linux
Sep 3, 2025 · Information Security

Hardening CentOS 7/8: 15 Essential Security Configurations

This guide walks through fifteen practical steps to secure a CentOS 7 or 8 server, covering user management, SSH hardening, password policies, file permissions, logging, and kernel protections, each with clear commands and explanations to reduce attack surface.

CentOSHardeningLinux
0 likes · 12 min read
Hardening CentOS 7/8: 15 Essential Security Configurations
Java Captain
Java Captain
Sep 3, 2025 · Operations

How to Turn a Raspberry Pi Zero W into a Tiny Web Server with SSH and Nginx

This step‑by‑step guide shows how to set up a Raspberry Pi Zero W, flash Raspbian Stretch Lite, configure Wi‑Fi and SSH, optimize the system with local mirrors, install Nginx, and expose the server to the internet using ngrok, turning a credit‑card‑sized board into a functional web host.

LinuxNGINXRaspberry Pi
0 likes · 12 min read
How to Turn a Raspberry Pi Zero W into a Tiny Web Server with SSH and Nginx
Liangxu Linux
Liangxu Linux
Aug 10, 2025 · Information Security

How to Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide

This comprehensive guide walks you through real‑world intrusion analysis, multi‑layer SSH hardening, Fail2Ban, firewall and iptables rules, intrusion detection with OSSEC, automated monitoring scripts, advanced techniques like port knocking and honeypots, and a complete incident‑response playbook to secure any Linux server.

Fail2banHardeningIDS
0 likes · 14 min read
How to Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide
Java Web Project
Java Web Project
Jul 31, 2025 · Operations

How to Turn a Raspberry Pi Zero W into a Tiny Web Server with SSH and Ngrok

This step‑by‑step guide shows how to choose a Raspberry Pi Zero W, flash Raspbian Stretch Lite onto a micro‑SD card, enable headless SSH, configure Wi‑Fi, replace apt sources, install and start nginx, and expose the site to the internet using ngrok, while noting performance and troubleshooting tips.

LinuxNGINXRaspberry Pi
0 likes · 11 min read
How to Turn a Raspberry Pi Zero W into a Tiny Web Server with SSH and Ngrok
Liangxu Linux
Liangxu Linux
Jul 21, 2025 · Information Security

Stop SSH Brute‑Force Attacks: 4 Hardening Techniques with Fail2ban and Key Authentication

This guide explains four practical ways to protect a Linux server from SSH brute‑force attacks—using complex passwords, changing the default port, disabling direct root login, and enabling public‑key authentication—plus detailed steps to install and configure Fail2ban for automatic IP blocking.

Brute-force protectionLinux securityPublic Key Authentication
0 likes · 9 min read
Stop SSH Brute‑Force Attacks: 4 Hardening Techniques with Fail2ban and Key Authentication
Raymond Ops
Raymond Ops
Jul 18, 2025 · Operations

Step-by-Step Guide to Upgrading OpenSSH to 8.4p1 on CentOS 7

This tutorial walks you through checking the current OpenSSH version, installing required dependencies, downloading the 8.4p1 source package, backing up existing SSH files, compiling and installing the new version, updating the configuration, and verifying the upgrade on a CentOS 7 system.

CentOSLinuxOpenSSH
0 likes · 5 min read
Step-by-Step Guide to Upgrading OpenSSH to 8.4p1 on CentOS 7
Ops Community
Ops Community
Jul 4, 2025 · Information Security

Master Enterprise Linux Security Hardening: From Basics to Advanced

This comprehensive guide walks you through essential Linux security hardening steps—including system updates, service disabling, password policies, SSH configuration, firewall rules, intrusion detection, file integrity monitoring, log auditing, automation scripts, and emergency response—to help enterprises build a resilient and continuously protected infrastructure.

AutomationLinuxSSH
0 likes · 9 min read
Master Enterprise Linux Security Hardening: From Basics to Advanced
Liangxu Linux
Liangxu Linux
Jul 3, 2025 · Information Security

Four Effective Ways to Stop SSH Brute‑Force Attacks

This guide explains four practical methods—using strong passwords, changing the default SSH port, disabling direct root login while granting sudo rights to a regular user, and enabling key‑based authentication—plus how to install and configure Fail2ban to automatically block repeated login failures on Linux servers.

SSHSecuritybrute force
0 likes · 10 min read
Four Effective Ways to Stop SSH Brute‑Force Attacks
Liangxu Linux
Liangxu Linux
Jun 28, 2025 · Information Security

Step-by-Step Guide to Configuring Linux Firewall, Web Server, and SSH Access

This tutorial walks through setting up a Linux firewall with multiple network interfaces, configuring a DMZ web server, enabling HTTP/HTTPS services, blocking ICMP ping, and securely exposing SSH on a custom port for both internal and external access, complete with command examples and verification steps.

SSHWeb serverfirewall
0 likes · 7 min read
Step-by-Step Guide to Configuring Linux Firewall, Web Server, and SSH Access
Ops Development & AI Practice
Ops Development & AI Practice
Jun 21, 2025 · Information Security

Why Ed25519 Is Replacing RSA for SSH: Security, Speed, and Simplicity

Ed25519, a modern elliptic‑curve signature algorithm, offers higher security, faster key generation and verification, smaller keys, and resistance to side‑channel attacks, making it the preferred default for SSH keys over RSA and traditional ECDSA, and the article explains its design, benefits, and usage steps.

Ed25519SSHperformance
0 likes · 7 min read
Why Ed25519 Is Replacing RSA for SSH: Security, Speed, and Simplicity
Raymond Ops
Raymond Ops
Jun 18, 2025 · Information Security

How SSH Secures Remote Logins: From Basics to Practical Setup

This article explains SSH as a secure remote login protocol, covering its encryption principles, protection against man‑in‑the‑middle attacks, password and public‑key authentication methods, key generation commands, and essential configuration files like known_hosts and authorized_keys.

Public Key AuthenticationSSHencryption
0 likes · 11 min read
How SSH Secures Remote Logins: From Basics to Practical Setup
Liangxu Linux
Liangxu Linux
Jun 16, 2025 · Information Security

Hardening CentOS 7/8: Essential Security Baseline Steps

This guide outlines a comprehensive set of security hardening measures for CentOS 7/8 servers, including creating non‑root users, disabling root SSH login, configuring password policies, tightening SSH settings, enabling logging, and applying kernel protections such as ASLR to reduce attack surface.

HardeningPasswordPolicySSH
0 likes · 12 min read
Hardening CentOS 7/8: Essential Security Baseline Steps
Lin is Dream
Lin is Dream
Jun 12, 2025 · Information Security

How to Securely Set Up a Restricted SFTP Account on Linux Using chroot

Learn step‑by‑step how to create a dedicated Linux SFTP user with chroot confinement, configure group permissions, set up a secure upload directory, adjust SSH settings, and restart the service to ensure the account can only upload files without shell access, following the principle of least privilege.

LinuxSFTPSSH
0 likes · 7 min read
How to Securely Set Up a Restricted SFTP Account on Linux Using chroot
Lin is Dream
Lin is Dream
Jun 11, 2025 · Information Security

Why SFTP Beats FTP: Secure File Transfer for Java Projects

Learn why SFTP, built on SSH, offers encrypted, authenticated file transfers unlike plain FTP, and how Java developers can securely integrate SFTP using libraries like JSch, with practical comparisons, usage scenarios, and a visual illustration of protocol differences.

JavaSFTPSSH
0 likes · 7 min read
Why SFTP Beats FTP: Secure File Transfer for Java Projects
Efficient Ops
Efficient Ops
Jun 8, 2025 · Operations

Why Tabby Is the Ultimate Open‑Source Terminal Emulator for Developers

Tabby is a highly configurable, open‑source terminal emulator and SSH/serial client supporting Windows, macOS and Linux, offering features such as integrated SSH/Telnet, serial terminals, customizable shortcuts, split panes, auto‑saving tabs, cross‑platform shells, Zmodem file transfer, full Unicode support, and a smooth Windows shell experience, with easy installation and connection setup.

SSHcross-platformopen-source
0 likes · 3 min read
Why Tabby Is the Ultimate Open‑Source Terminal Emulator for Developers
Raymond Ops
Raymond Ops
Jun 4, 2025 · Operations

Mastering SFTP: Complete Planning, Configuration, and High‑Availability Guide

This guide walks you through SFTP server planning, user naming conventions, directory structures, SSH configuration, account creation, permission setup, client usage, log auditing, rotation, connection limits, monitoring, and high‑availability deployment across multiple servers, providing ready‑to‑run commands and scripts.

ACLLinuxSFTP
0 likes · 14 min read
Mastering SFTP: Complete Planning, Configuration, and High‑Availability Guide
Architect's Tech Stack
Architect's Tech Stack
May 5, 2025 · Operations

Introducing T‑Shell: An Intelligent Command‑Line Terminal Application (Installation, Features, and Usage Guide)

T‑Shell is an open‑source intelligent command‑line terminal for Windows that integrates SSH, local operations, customizable themes, shortcut commands, Linux shells, Chinese support, and SFTP, with detailed installation, build, and usage instructions, plus tutorials on hosts, shortcuts, global variables, and file management.

SSHT-ShellTutorial
0 likes · 4 min read
Introducing T‑Shell: An Intelligent Command‑Line Terminal Application (Installation, Features, and Usage Guide)
Open Source Linux
Open Source Linux
Apr 28, 2025 · Information Security

Hardening CentOS 7/8: Essential Security Configurations to Protect Your Linux Servers

This guide walks you through a series of practical security measures for CentOS 7/8—including creating non‑root users, tightening SSH settings, enforcing password policies, securing logging, and applying kernel hardening—so you can significantly reduce the risk of unauthorized access and system compromise.

CentOSHardeningPassword policy
0 likes · 12 min read
Hardening CentOS 7/8: Essential Security Configurations to Protect Your Linux Servers
Open Source Linux
Open Source Linux
Apr 10, 2025 · Information Security

How to Harden Linux Systems: Practical Security Hardening Steps for RHEL 7

This guide walks through practical Linux security hardening on RHEL 7, covering account lockdown, password policies, SELinux activation, SSH port changes, login restrictions, file immutability, compiler and log protection, and minimal firewall rules to elevate the system to a higher security level.

RHEL7SELinuxSSH
0 likes · 12 min read
How to Harden Linux Systems: Practical Security Hardening Steps for RHEL 7
Raymond Ops
Raymond Ops
Mar 31, 2025 · Operations

Master Docker: Core Concepts, Installation, and Essential Commands

This guide explains Docker’s basic concepts, advantages, architecture, installation steps, common image and container commands, and provides a practical example of configuring SSH access inside an Ubuntu container for both local and remote connections.

ContainersDockerImage Management
0 likes · 11 min read
Master Docker: Core Concepts, Installation, and Essential Commands
Efficient Ops
Efficient Ops
Mar 26, 2025 · Operations

Why WindTerm Is the Next‑Gen Terminal Tool for Ops Professionals

WindTerm is a high‑performance, cross‑platform terminal offering multi‑protocol support, advanced SSH features, modern GUI, efficient tool integration, session management, and performance optimizations, with easy installation and powerful SSH, SFTP, and auto‑completion capabilities for operations teams.

SFTPSSHcross-platform
0 likes · 5 min read
Why WindTerm Is the Next‑Gen Terminal Tool for Ops Professionals
Lin is Dream
Lin is Dream
Mar 15, 2025 · Fundamentals

Mastering macOS Network Settings: DHCP, DNS, NAT, VPN & More Explained

This guide walks through macOS network configuration on a MacBook Pro M1, covering Wi‑Fi advanced settings, TCP/IP fundamentals such as DHCP, IP addressing and subnet masks, NAT translation, routing tables, DNS servers, proxy types, VPN (L2TP) setup, SSH usage, and Ethernet interface details.

DHCPDNSNAT
0 likes · 18 min read
Mastering macOS Network Settings: DHCP, DNS, NAT, VPN & More Explained
Lin is Dream
Lin is Dream
Mar 13, 2025 · Information Security

From rlogin to SSH: The Evolution of Secure Remote Login

This article traces the evolution of remote login from early terminal‑based systems to modern secure protocols, explains the development and key features of SSH, compares it with HTTP, and outlines its main functions such as remote access, file transfer, and port forwarding.

LinuxOpenSSHProtocol History
0 likes · 6 min read
From rlogin to SSH: The Evolution of Secure Remote Login
Open Source Linux
Open Source Linux
Feb 12, 2025 · Operations

Master Jenkins: Step-by-Step Guide to Automated CI/CD Deployment on Linux

This comprehensive tutorial explains what Jenkins is, why CI/CD matters, and provides step‑by‑step instructions for installing JDK and Jenkins on Linux, configuring Git and Maven integration, setting up credentials and password‑less SSH, and creating deployment scripts to automate Java application builds and releases.

GitJenkinsSSH
0 likes · 13 min read
Master Jenkins: Step-by-Step Guide to Automated CI/CD Deployment on Linux
Liangxu Linux
Liangxu Linux
Feb 5, 2025 · Operations

Master SSH Config: 8 Powerful Tricks to Simplify Remote Access

This guide explains what SSH is, how to generate keys, and provides detailed examples of configuring ~/.ssh/config with common parameters and eight practical tricks—including managing multiple key pairs, remote file editing with vim, port forwarding, connection sharing, keyword logins, proxying, and remote command execution—to streamline and secure your remote workflows.

CONFIGDevOpsLinux
0 likes · 14 min read
Master SSH Config: 8 Powerful Tricks to Simplify Remote Access
Raymond Ops
Raymond Ops
Jan 24, 2025 · Information Security

Secure Your SSH Login with Google Authenticator: Step‑by‑Step Guide

This tutorial explains how to enhance SSH security by integrating Google Authenticator for two‑factor authentication, covering SSH basics, Google Authenticator overview, Linux installation steps, PAM configuration, client setup on Android, browsers, and Python, with complete command examples.

Google AuthenticatorLinuxSSH
0 likes · 9 min read
Secure Your SSH Login with Google Authenticator: Step‑by‑Step Guide
Open Source Linux
Open Source Linux
Jan 17, 2025 · Operations

Master MobaXterm: Create SSH Sessions, Set Hotkeys, and Transfer Files on Windows

This guide introduces MobaXterm—a powerful SSH client and terminal toolbox for Windows—covers its main features, pros and cons, and provides step‑by‑step instructions for creating SSH sessions, enabling right‑click paste, duplicating tabs, configuring keyboard shortcuts, transferring files, and adjusting terminal font size.

MobaXtermRemote accessSSH
0 likes · 6 min read
Master MobaXterm: Create SSH Sessions, Set Hotkeys, and Transfer Files on Windows
Raymond Ops
Raymond Ops
Jan 7, 2025 · Information Security

Mastering SSH: Asymmetric Encryption, Authentication, and Configuration Explained

This comprehensive guide explores the fundamentals of asymmetric encryption, delves into SSH’s architecture—including host verification, user authentication, and key management—provides detailed walkthroughs of configuration files, command usage, SCP transfers, automation scripts, and performance optimization techniques for secure and efficient remote access.

AutomationConfigurationPublic Key Authentication
0 likes · 47 min read
Mastering SSH: Asymmetric Encryption, Authentication, and Configuration Explained
Liangxu Linux
Liangxu Linux
Jan 2, 2025 · Information Security

How to Block SSH Logins for Specific Users, Groups, and IP Ranges on Linux

This guide explains multiple Linux techniques—setting a user’s shell to /sbin/nologin, editing /etc/passwd, configuring sshd_config with Allow/Deny directives, and using hosts.allow/hosts.deny—to prevent unwanted SSH access for particular users, groups, or IP addresses, and shows how to apply the changes safely.

LinuxSSHhosts.allow
0 likes · 11 min read
How to Block SSH Logins for Specific Users, Groups, and IP Ranges on Linux
Liangxu Linux
Liangxu Linux
Jan 1, 2025 · Operations

Master SSH Config: 8 Powerful Tips to Simplify Remote Access

This guide explains what SSH is, how to configure the ~/.ssh/config file, and presents eight practical techniques—including managing multiple key pairs, remote file editing with Vim, port forwarding, connection sharing, keyword login, and proxying—to streamline and secure remote server operations.

SSHssh tipsssh-config
0 likes · 12 min read
Master SSH Config: 8 Powerful Tips to Simplify Remote Access
Practical DevOps Architecture
Practical DevOps Architecture
Nov 27, 2024 · Operations

Bash Script for Key‑Based Multi‑Host SSH Access

This Bash script automates key‑based SSH authentication across multiple hosts by scanning a subnet, generating a key pair, installing sshpass, copying the public key and known_hosts file to each reachable machine, and ensuring password‑less login for subsequent connections.

BashSSHkey authentication
0 likes · 3 min read
Bash Script for Key‑Based Multi‑Host SSH Access
Java Architect Essentials
Java Architect Essentials
Nov 21, 2024 · Operations

Using Tabby: Installation, SSH Connection, and SFTP Transfer Guide

This article introduces the open‑source Tabby terminal emulator, explains how to download the appropriate installer for Windows, macOS, or Linux, and provides step‑by‑step instructions for creating SSH connections and using the built‑in SFTP feature to transfer files between local and remote machines.

InstallationSFTPSSH
0 likes · 4 min read
Using Tabby: Installation, SSH Connection, and SFTP Transfer Guide
Liangxu Linux
Liangxu Linux
Oct 29, 2024 · Information Security

Essential Linux Red Hat Security Hardening Checklist: Accounts, Passwords, SSH, and Services

This guide provides a comprehensive step‑by‑step checklist for hardening Red Hat Linux systems, covering shared account detection, redundant account lockout, root remote‑login restrictions, password complexity and lifespan policies, critical directory permissions, default umask settings, audit logging, remote log server configuration, history timestamping, SSH hardening, unnecessary service removal, Ctrl‑Alt‑Del disabling, and patch management.

HardeningLinuxPassword policy
0 likes · 16 min read
Essential Linux Red Hat Security Hardening Checklist: Accounts, Passwords, SSH, and Services
Liangxu Linux
Liangxu Linux
Oct 21, 2024 · Operations

Master Linux File Transfer: Tools, Protocols, and Best Practices

This comprehensive guide explores Linux file transfer fundamentals, covering local and remote methods, command‑line and GUI tools, protocols like SSH, FTP, and HTTP, security considerations, performance tuning, common issues, and practical best‑practice recommendations for reliable data movement.

LinuxSSHfile transfer
0 likes · 10 min read
Master Linux File Transfer: Tools, Protocols, and Best Practices
MaGe Linux Operations
MaGe Linux Operations
Oct 19, 2024 · Operations

Mastering SSH: Run Remote Commands, Scripts, and Interactive Sessions

Learn how to leverage SSH for remote command execution, including running single and multiple commands, handling interactive sessions with pseudo‑terminal allocation, executing multi‑line commands, and running both local and remote scripts with parameter passing, all illustrated with practical examples.

AutomationLinuxSSH
0 likes · 8 min read
Mastering SSH: Run Remote Commands, Scripts, and Interactive Sessions
21CTO
21CTO
Oct 3, 2024 · Mobile Development

Turn Your iPhone into a Laptop: Foldable Keyboard, SSH, and Tailscale Setup

This article explains how a $25 fold‑able wireless keyboard, combined with Tailscale VPN, Blink Shell SSH client, and AirPlay mirroring, lets you use an iPhone as a lightweight laptop for blogging, coding, and remote work while traveling.

Blink ShellMobile DevelopmentSSH
0 likes · 9 min read
Turn Your iPhone into a Laptop: Foldable Keyboard, SSH, and Tailscale Setup