All Posts

082 | Firewall Basics: UFW — Simple and Powerful Protection

2025-08-14

Introduction: The First Line of Defense for Your Server

Before thinking about complex intrusion detection systems such as Fail2ban or CrowdSec, you need to build the first and most reliable line of defense—a firewall. A firewall controls all network traffic entering and leaving your server and blocks unauthorized connection attempts.

Traditionally, Linux servers have used iptables to manage firewalls, but its syntax can be complicated and confusing. Fortunately, there is a simpler and more intuitive tool — UFW (Uncomplicated Firewall).

081 | The Modern Approach: CrowdSec — Crowdsourced Threat Protection

2025-08-13

Introduction: From Local Defense to Global Protection

In the previous article, we explored Fail2ban — a reliable and time-tested tool for defending against brute-force attacks. However, Fail2ban only works with local logs and has no awareness of what’s happening on other servers. In today’s environment, where cyberattacks are increasingly distributed and sophisticated, we need a smarter and more collaborative solution.

Enter CrowdSec — a modern, open-source Intrusion Prevention System (IPS) that leverages a crowdsourced approach to build a global threat intelligence network.

080 | Classic Brute-Force Protection: Fail2ban

2025-08-12

Introduction: Server Security — The First Line of Defense

Once you deploy any server or virtual machine, one of the first and most important tasks is ensuring its security. Even if your server doesn’t contain critical data, it can still be targeted by automated bots constantly scanning the internet for vulnerabilities. The most common type of attack against any server is brute-force password guessing, typically aimed at SSH access, FTP services, or web control panels.

068 | Internet Link Redundancy (for Web Services and Data Centers)

2025-07-30

We conclude our series on communication link redundancy by exploring perhaps the most critical scenario for modern companies: ensuring continuous Internet access for web services, applications, and data centers. If your website, online store, cloud services, or APIs become unreachable to the outside world, the consequences are immediate — lost customers, lost revenue, and reputational damage.

Providing resilience at this level is complex but absolutely essential, requiring deep understanding of network protocols and architectures.

Case Study: Configuring Port Knocking on MikroTik for Enhanced Security

2025-07-16

In a world where cyberattacks are becoming increasingly sophisticated, protecting remote access to servers and network equipment is of paramount importance. Simply opening ports for SSH, RDP, or web interfaces makes them targets for constant scanning and brute-force attacks.

Today, we’ll explore a powerful yet lesser-known technique that significantly improves the security of your MikroTik (and not only): Port Knocking. It’s not just about “closing ports,” but a smart system that makes your services invisible to most scanners and bots.

How to Restore Access to WordPress Administrator: Resetting Password via Database

2025-07-14

Losing access to the WordPress administrator account can be a real headache. Sometimes, standard password recovery methods (via email) don’t work, especially if:

  • You forgot both your login and password.
  • The site’s mail sending function (wp_mail) is broken.
  • The WordPress admin panel is broken or unavailable.
  • The only access left is to the database (via MySQL client, phpMyAdmin, WP-CLI, etc.).

In this article, we’ll walk through a reliable and secure way to find the WordPress administrator directly in the database and reset their password using SQL. We’ll follow DevSecOps best practices to avoid breaking serialized data and minimize risks.

VPNCloud: Building Your Private Network in the Cloud

2025-06-25

VPNCloud: Building Your Private Network in the Cloud

In a world where more and more services are moving to the cloud and remote work has become the norm, secure and private access to your resources is more important than ever. Traditional VPN services, while solving some problems, are often centralized and may not be the most flexible solution for creating your own secure network between multiple servers, devices, or even offices.