Security

SSH Keys
SSH keys are really neat! The DigitalOcean article on How To Set Up SSH Keys does an excellent job on explaining what SSH keys are and how to create them. In short, SSH keys are much more secure than …
Content Security Policy (CSP) Report URI for free
Content Security Policy (CSP) is a great way to protect your sites. You implement it by adding a header to your web server’s HTTP response. The hardest part, in my opinion, is finding out where you …
Cloudflare Firewall Rules to Protect WordPress
Cloudflare Firewall rules a protecting my site from a brute force attack from a botnet. Below I’ll show you how to use Firewall Rules to keep your WordPress site safe. With the Cloudflare free plan, …
How to secure your PHP Web App with a simple Firewall
I was trying to find a simple way to secure my PHP Web App when I realized how difficult it could be. Securing it the easy way cost more money than I’m willing to spend, so I decided to build my own …
Securing a Server
This post will cover securing a Linux server. Back in the day, I started with Red Hat 6 and Slackware 4; I still have a book from when I was learning Red Hat 6. I also ended up learning FreeBSD, but …