Exposing ssh to outer internet
I tried some services like cloudflare but it all required some kind of soft on client side. I found ssh-j.com. It’s perfect, bir forwarding port to unknown server is scary, can I trust it?
Collaborate Disseminate
I tried some services like cloudflare but it all required some kind of soft on client side. I found ssh-j.com. It’s perfect, bir forwarding port to unknown server is scary, can I trust it?
One of the benefits of using OpenPGP authentication subkeys instead of arbitrarily created SSH keyfiles, is key expiration and revocation.
While there is plenty of documentation on how to use OpenPGP for SSH Servers, I could not find anyth… Continue reading Managing SSH authorized keys exported from OpenPGP keys
Sudo via SSH lets you run admin commands on a remote server with elevated privileges. Learn the commands with this concise guide. Continue reading How to Run a Command That Requires sudo via SSH
I am trying to solve vulnerability reported for QID 38909 i.e SHA1 deprecated setting for SSH. I have hardened the sshd configs in /etc/ssh/sshd_config and /etc/crypto-policies/backends/openssh and opensshserver.config. below is the ouput … Continue reading QID 38909 SHA1 deprecated setting for SSH (RHEL 8.6)
While investigating an incident involving the BellaCiao .NET malware, Kaspersky researchers discovered a C++ version they dubbed “BellaCPP”. Continue reading BellaCPP: Discovering a new BellaCiao variant written in C++
While the CrowdStrike incident is still fresh in our minds, Kaspersky experts look back on similar IT outages that happened in 2024 and predict potential threats for 2025. Continue reading Story of the Year: global IT outages and supply chain attacks
We tinkerers often have ideas we know are crazy, and we make them up in the most bizarre places, too. For example, just imagine hosting a website while pedaling across …read more Continue reading Pedaling your Mobile Web Server Across the Globe
If your Linux shell scripts are getting tripped up by SSH fingerprints, follow this concise tutorial for an easy solution. Continue reading How to Add an SSH Fingerprint to Your known_hosts File in Linux
first I noticed that there is a process named kswapd0 using 100% of 4 out of 8 CPU cores. I killed it several times and then added to /etc/sysctl.conf the line
vm.swappiness=10
After that there appeared another process named kauditd0 usin… Continue reading How can crypto miners access my computer [closed]
I just know everyone is going to shout at me that public key is better but let me spell out the actual scenario first.
I have a small LAN at home, basically I’m the only regular user but other members of the family are connected occasional… Continue reading Relative security of ssh password and public key to remote systems