Tagged articles
9 articles
Page 1 of 1
Raymond Ops
Raymond Ops
Oct 13, 2025 · Information Security

How to Secure Your Ubuntu Kubernetes Cluster: A Step‑by‑Step Hardening Guide

This comprehensive guide explains how to harden an Ubuntu‑based Kubernetes cluster with external IPs by applying system hardening, firewall rules, TLS encryption, Calico network policies, RBAC permissions, audit logging, and verification steps to achieve a multi‑layered security posture.

HardeningKubernetesRBAC
0 likes · 17 min read
How to Secure Your Ubuntu Kubernetes Cluster: A Step‑by‑Step Hardening Guide
Raymond Ops
Raymond Ops
Jun 13, 2025 · Information Security

Master Ubuntu’s UFW: Simple Commands to Enable, Configure, and Manage Firewall Rules

This article introduces Ubuntu’s Uncomplicated Firewall (UFW), explaining how to enable, disable, reset, set default policies, and create, modify, or delete specific IP, port, and protocol rules using concise command-line examples, helping users quickly secure client machines with practical firewall configurations.

Command-lineSecurityUbuntu
0 likes · 7 min read
Master Ubuntu’s UFW: Simple Commands to Enable, Configure, and Manage Firewall Rules
Java Tech Enthusiast
Java Tech Enthusiast
Oct 22, 2024 · Information Security

How to Harden Ubuntu 20.04 Server: SSH, Users, Keys, and Firewall

This guide walks through securing an Ubuntu 20.04 server by updating packages, changing the default SSH port, enforcing strong passwords, creating a non‑root user with sudo, disabling root login, enabling RSA key authentication, configuring the UFW firewall, and blocking ping requests.

Linux securityRSA keysSSH Hardening
0 likes · 9 min read
How to Harden Ubuntu 20.04 Server: SSH, Users, Keys, and Firewall
Liangxu Linux
Liangxu Linux
Sep 22, 2022 · Information Security

Comparing Top Open-Source Linux Firewalls: Features & Use Cases

An overview of essential Linux firewall solutions—including iptables, IPCop, Shorewall, UFW, Vuurmuur, pfSense, IPFire, Smoothwall, Endian, and ConfigServer—covers their core functions, key features, and typical use cases, helping administrators choose the right tool for network protection.

firewalliptableslinux
0 likes · 9 min read
Comparing Top Open-Source Linux Firewalls: Features & Use Cases
MaGe Linux Operations
MaGe Linux Operations
Dec 12, 2021 · Information Security

How to Stop Brute‑Force SSH Attacks on Your Raspberry Pi

This article explains how a Raspberry Pi exposed to the Internet was repeatedly attacked via SSH, how the author identified the brute‑force attempts in /var/log/auth.log, and step‑by‑step methods using hosts.allow/deny and ufw to whitelist trusted IPs and block malicious traffic.

Brute-force protectionLinux securityRaspberry Pi
0 likes · 5 min read
How to Stop Brute‑Force SSH Attacks on Your Raspberry Pi