Latest stories

Limit SSH Logins by Country on Ubuntu 22.04.3

L

Hiding your SSH login from potential attackers is crucial for safeguarding your server. In this guide, we’ll explore how to further enhance your server’s security by limiting SSH logins based on the country of the connecting IP address. While this method adds an extra layer of security, it’s important to note that it may not prevent access if attackers are using VPNs with IP...

Bash It Out: A Guide to Bash Statement Types

B

Introduction Bash is a command language interpreter that executes commands read from the standard input or from a file. Also known as the Bourne Again SHell, bash is the default shell on most Linux distributions and macOS. Bash provides programming constructs that enable you to control the flow of commands like loops and conditionals. This allows you to write shell scripts to automate repetitive...

code block post

c

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form, by injected humour, or randomised words which don’t look even slightly believable. If you are going to use a passage of Lorem Ipsum, you need to be sure there isn’t anything embarrassing hidden in the middle of text. All the Lorem Ipsum generators on the Internet...

test 02

t

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature...

Recent Posts

Pages

Archives

About

middle aged linux nerd. likes coding and pizza. owner of this particular site.