Personally I disagree. You might be running internal services you do not want to expose. It also is an active step to expose something. This way you are in control what is exposed and what isn’t.
Personally I disagree. You might be running internal services you do not want to expose. It also is an active step to expose something. This way you are in control what is exposed and what isn’t.
Exactly this. I remember how hard it was for me to start and how often I screwed up, felt uncertain, …
Thank you very much. Means a lot coming from the creator of noted.lol!
Which reminded me, I always wanted to donate and just did so!
You are the reason I choose Ghost by the way and got quite a few inspiration from your articles! Thanks for that.
Wow… very narrow minded perspective you have. So you call me scum, but did you donate or did you consume my content for free? Lol (I know the answer as so far I did not receive donations)
I embrace new technology and as I wrote in my about section, I adopt GenAI for learning purposes. Because learning in real life use cases is how I learn best.
I am sharing knowledge for free, spend hours on writing these articles. If I would need to pay for the pictures out of my pocket, I would not make my content available.
I am happy to donate to people who spend time giving back to the community, I do not rely on donations, but if anyone is like me, I am happy to accept them!
GenAI is one of the biggest revolutions we habe seen so far. Get behind it or be left in the dust…
Yeah and I went through it with thinking, let’s make it as secure as possible without 100% knowing the effect…
You need password auth for copying your key, don’t you. Unless you import it during the install…
Thanks for the advice!
Why would you leave PermitRootLogin to yes? Doesn’t really matter, if root ca nit login anyways?!
You are right on restarting sshd. That’s a typo…
An other user also mentioned to not fill out the root password and it will disable root + install sudo. Guess I didn’t read the instructions properly. Will definable be adopted.
I agree on importing from Github, but I am unsure how many people have their keys there…
UFW on a virtual machine might not be needed, but also not really harmful. I do like having in on every machine for piece of mind. Also this guide can be used for bare metal installs.
Crowdsec is on the todo list!
Thanks again. I will keep updating my article 😊
All right, you got my attention 😂
Challenge accepted! (Some rainy day I got some time).
Thanks for that!
Honestly, when I tried it was like two years ago. I think back then I wasn’t experienced enough and was annoyed at some stage not being able to get docker to run.
I should give it another go. Would you just do it on RPi and a LXC container or also on your VM?
Thanks!
I saw the ed25519 keys sometime ago, but haven’t had time to understand it.
Will look into it and the link!
Nice timing! Happy you found it exactly when you needed it
Just because I know it and I wanted something with as little bloat as possible.
Tried alpine once, could not get it running.
I tried it briefly, but had to many issues getting it up and running properly…
Not helpful… If that is your opinion, then at least put some reasoning behind it…
For sure not best practice, but I have a SMB share on my servers for the Docker folder and mount it on my dev machine.
Recently switched to a dev VM on my hypervisor, which has VSCode Server from Coder running. It also has the different shares mounted. Now I can VPN in from anywhere, switch on my dev VM and do whatever needs doing with my full environment available to me.