TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Securing a Linux Server

62 pointsby matricaria9 months ago

5 comments

petesergeant9 months ago
Is there any point in Fail2ban if you're using keys and have disabled passwords? I guess defense in depth and all that
评论 #41447555 未加载
评论 #41459139 未加载
评论 #41447565 未加载
评论 #41447321 未加载
jasonrojas8 months ago
There are a few other posts on HN with the same title. Some things to also consider that I had not seen mentioned: PCI CIS Etc…<p>Include many more things specifically around ssh that you can do outside of fail2ban, also things that are requirements for the above….<p>These posts are good but slightly miss a lot of security practices that are “standard”. As always the best security is not allowing the system to be connected to anything. But in the event that you have to have a system with such availability, it’s always best to introduce at least CIS foundations and whatever you see fit for security. Just my .02..
评论 #41459180 未加载
klaussilveira9 months ago
This is neat. Modern take and very pragmatic.
评论 #41448135 未加载
laweijfmvo8 months ago
After following this guide, all requests to my website time out, so I guess it&#x27;s secure!
评论 #41448152 未加载
评论 #41459110 未加载
KenHV8 months ago
I&#x27;m surprised my post made it to HN :D