gkd@lemmy.ml to Programmer Humor@lemmy.ml · 1 year ago“But how do I access it?”i.imgur.comimagemessage-square63fedilinkarrow-up1674arrow-down115
arrow-up1659arrow-down1image“But how do I access it?”i.imgur.comgkd@lemmy.ml to Programmer Humor@lemmy.ml · 1 year agomessage-square63fedilink
minus-squareblkpws@lemmy.mllinkfedilinkarrow-up2·1 year agoThere is a guide how to protect password brute force over SSH, which is the most attacked https://medium.com/@bnay14/installing-and-configuring-fail2ban-to-secure-ssh-1e4e56324b19 But I also recommend you to change the SSH port to another, is simple and pretty effective as all those bots are always using the default port and not doing a deep scan.
minus-squareblkpws@lemmy.mllinkfedilinkarrow-up2·1 year agoOh well, I only run services on my cloud, so I need to get SSH to manage them. hehehe 😄
deleted by creator
There is a guide how to protect password brute force over SSH, which is the most attacked https://medium.com/@bnay14/installing-and-configuring-fail2ban-to-secure-ssh-1e4e56324b19
But I also recommend you to change the SSH port to another, is simple and pretty effective as all those bots are always using the default port and not doing a deep scan.
deleted by creator
Oh well, I only run services on my cloud, so I need to get SSH to manage them. hehehe 😄
deleted by creator