SSH tunnel

What is SSH? SSH is an abbreviation for Secure SHell. Secure is for secure; and what is secure with SSH? The connection to a remote computer. Because SSH is a communication protocol that encrypts the connection between two computers. A SHell is a user interface Often a console, a command line interpreter (CLI), but it can be […]

ssh attack

Install DenyHosts to Protect and Secure SSH

DenyHosts monitors server logs and bans ips that exceed a certain number of failed logins. It is an effective security tool, written in python, this software helps to prevent brute force attacks on a virtual server. Install DenyHosts sudo rpm -Uvh sudo yum install denyhosts Whitelist IP Addresses Edit the file : hosts.allow nano /etc/hosts.allow […]