Working on a website that you need others to see, but not the whole world? Password protecting a website (or a sub directory within a website).
Protecting files on your website from unauthorized users can be very important. You can use PHP or any language to listen for login authorization information on each page, but that doesn’t protect your images, documents, and other media and it is not proper way to do so.
That’s why I’ve found the new method of protecting files and directories the most reliable and is actually a pretty easy thing to do.
Continue reading “How to Password Protect a Website or Web SubDirectory With .htaccess & .htpasswd”
One popular usage of SSH is to allow users to access a command shell on a remote computer for administrative purposes, normally TCP port 22 is used by it. SSH logins are very sensitive to brute force attacks. A thousand things can go wrong which could give someone unauthorized access to your server. As long as people use weak passwords, the bad guys will be trying to brute force them.
Because a lot of people with SSH servers use weak passwords, many online attackers will look for an SSH server, then start guessing passwords at random. An attacker can try thousands of passwords in an hour, and guess even the strongest password given enough time. The recommended solution is to use SSH keys instead of passwords.
The best way to secure your SSH login is to use Public/Private PEM keys. This is default login type for Amazon EC2 servers. In this post will show you how to use PEM file to login to your VPS or any other Ubuntu server.
Continue reading “How To Setup Password-less Login to Ubuntu/Linux using SSH KeyGen/RSA Key”
Changes the permission of a file.
chmod [OPTION]... MODE[,MODE]... FILE...
chmod [OPTION]... OCTAL-MODE FILE...
chmod [OPTION]... --reference=RFILE FILE...
Continue reading “Linux ‘chmod’ command on Ubuntu Server”