Search Our Database

How to track and block Brute-Force Login Attempts on SSH

Introduction SSH brute-force attacks are one of the most common security threats faced by Linux servers exposed to the internet. These attacks involve automated scripts attempting to gain unauthorized access by trying thousands of username and password combinations. If left unchecked, brute-force attacks can lead to compromised systems, service slowdowns, or even server crashes due

How to create SSH keys using DirectAdmin (Evolution Skin)?

📘 Introduction SSH keys offer a secure and passwordless method of accessing your server. DirectAdmin’s Evolution skin allows you to create SSH keys directly from the control panel. This article shows how to create and authorize SSH keys using the modern Evolution interface. 🛠️ Pre-requisites Ensure the following before proceeding: You can access DirectAdmin with

How to check open port via SSH

Introduction To check the firewall status and determine which ports are open or blocked on a Linux system, there are several tools and commands available. The specific method depends on the type of firewall installed and in use on your system. Knowing how to check the firewall status and port accessibility is crucial for managing

Connect via SFTP using SSH Key Authentication with FileZilla

Introduction Secure File Transfer Protocol (SFTP) is a trusted method for securely transferring files between a local machine and a remote server. FileZilla, a widely-used open-source FTP client, supports SFTP connections using SSH key authentication. This guide walks you through the process of configuring FileZilla to connect using a private SSH key. Prerequisites FileZilla installed

How to Set Up SSH Port Forwarding Using PuTTY

Introduction Remote port forwarding is a powerful feature of SSH that allows external devices to securely access services hosted on your local machine by routing connections through an SSH server. This can be extremely useful for accessing internal web servers, development environments, or other applications that are otherwise unreachable from outside your network. By setting

Access OpenVPN Server via SSH to Create a VPN User

Overview This guide provides step-by-step instructions on how to connect to your OpenVPN server via SSH and create a new VPN user. By following this process, you’ll be able to generate the necessary client certificates and keys, which are required for new users to securely connect to your OpenVPN environment. This method is commonly used

FAQ: I need a hosted Linux server (shared) with SSH access to use as my remote/cloud server for running Python programs. It should support inbound and outbound internet access through specific ports and work with my domain or subdomain, both with and without SSL. Do you offer a plan that meets these requirements with minimal server specs?

I need a hosted Linux server (shared) with SSH access to use as my remote/cloud server for running Python programs. It should support inbound and outbound internet access through specific ports and work with my domain or subdomain, both with and without SSL. Do you offer a plan that meets these requirements with minimal server

Adding DNS Records via SSH in cPanel and DirectAdmin

Introduction DNS (Domain Name System) records are critical for directing domain-related traffic to the appropriate servers. While cPanel and DirectAdmin provide graphical interfaces for managing DNS records, there are situations where direct SSH access is necessary. This might include cases where the graphical interface is unavailable, multiple records need to be updated efficiently, or automation