Русский flag Русский

All Posts

088 | The Rise of Zero-config VPN: Mesh Networks on WireGuard

2025-08-20

Evolution of Remote Access

Traditional VPN services, which most of us are familiar with, work on the “hub-and-spoke” principle (star topology). This means that all traffic from the client to the protected network passes through a central server. This approach has drawbacks:

  • Configuration complexity: Manual setup, port forwarding, and key management are required.
  • Performance: All traffic, even between two remote clients, must go through the central server, which increases latency.
  • Single point of failure: If the central server goes down, the entire network stops working.

A new concept — Zero-config VPN — solves these problems by using a mesh network architecture.

087 | Dynamic Routing on Keenetic: BGP and OSPF

2025-08-19

Dynamic Routing on Keenetic: BGP and OSPF

When Static Routing Isn’t Enough

In most home networks, routing is simple: all traffic is sent through a single ISP. In such cases, static routing is sufficient. But what if you have a complex network with multiple routers, redundant connections, or you want to experiment with advanced networking? This is where dynamic routing protocols come into play.

KeeneticOS includes built-in support for these protocols, allowing it to automatically exchange routing information with other routers, adapt to network changes, and ensure failover capabilities.

086 | Keenetic as a VPN Client: Securing Your Network

2025-08-18

Keenetic as a VPN Client: Network-Wide Protection

Why Use a Router-Level VPN Client?

Setting up a VPN client on every individual device can be tedious. Moreover, many devices (Smart TVs, gaming consoles, IoT gadgets) don’t even support VPN connections. Keenetic solves this problem by acting as a central VPN client for the entire network. This allows you to protect all devices with a single VPN connection, eliminating the need to install and configure software on each one.

085 | Keenetic as a VPN Server: Secure Remote Access

2025-08-17

Keenetic as a VPN Server: Secure Remote Access

The Remote Access Problem

When you’re away from home or the office, accessing local resources — such as a network-attached storage (NAS), server, or smart devices — can be challenging. Opening ports to the public internet is unsafe. The solution is to create a secure VPN tunnel, allowing you to safely connect to your local network from anywhere in the world. Keenetic makes this task simple by offering powerful and flexible VPN server functionality right out of the box.

084 | Keenetic: A Modern Router with Modular Architecture

2025-08-16

Keenetic: A Router Whose Main Asset Is Its Operating System

A Quick Look at Keenetic

In the world of home routers, where most devices come with proprietary, bloated firmware, Keenetic stands out with its unique approach. Instead of competing solely on hardware, the company focuses on its own operating system — KeeneticOS. This makes their devices not just routers, but flexible, stable, and expandable network platforms.

KeeneticOS: Modular and Reliable Core

Under the hood, Keenetic runs a Linux-based system topped with a unique modular operating system. This approach offers two key advantages that tech-savvy users will appreciate:

083 | Proactive Security: Lynis and the Modern Approach to Linux Server Hardening

2025-08-15

Introduction: From Reactive Defense to Proactive Security

In 2025, attacks on servers are becoming increasingly sophisticated, and reactive measures (firewall, Fail2Ban, CrowdSec) are no longer enough. The modern DevSecOps approach requires proactive hardening—strengthening the system—to minimize the attack surface before public exploits appear.

Lynis remains one of the key open-source security auditing tools for Unix systems, but today it is crucial to complement it with integration into security standards frameworks (CIS, SCAP) and automation in CI/CD pipelines.

082 | Firewall Basics: UFW — Simple and Powerful Protection

2025-08-14

Introduction: The First Line of Defense for Your Server

Before thinking about complex intrusion detection systems such as Fail2ban or CrowdSec, you need to build the first and most reliable line of defense—a firewall. A firewall controls all network traffic entering and leaving your server and blocks unauthorized connection attempts.

Traditionally, Linux servers have used iptables to manage firewalls, but its syntax can be complicated and confusing. Fortunately, there is a simpler and more intuitive tool — UFW (Uncomplicated Firewall).

081 | The Modern Approach: CrowdSec — Crowdsourced Threat Protection

2025-08-13

Introduction: From Local Defense to Global Protection

In the previous article, we explored Fail2ban — a reliable and time-tested tool for defending against brute-force attacks. However, Fail2ban only works with local logs and has no awareness of what’s happening on other servers. In today’s environment, where cyberattacks are increasingly distributed and sophisticated, we need a smarter and more collaborative solution.

Enter CrowdSec — a modern, open-source Intrusion Prevention System (IPS) that leverages a crowdsourced approach to build a global threat intelligence network.

080 | Classic Brute-Force Protection: Fail2ban

2025-08-12

Introduction: Server Security — The First Line of Defense

Once you deploy any server or virtual machine, one of the first and most important tasks is ensuring its security. Even if your server doesn’t contain critical data, it can still be targeted by automated bots constantly scanning the internet for vulnerabilities. The most common type of attack against any server is brute-force password guessing, typically aimed at SSH access, FTP services, or web control panels.

079 | Hyper-V: Virtualization from Microsoft – Seamless Integration with Windows Server

2025-08-11


What is Hyper-V?

Hyper-V is Microsoft’s native virtualization platform, an integral part of Windows Server operating systems and optionally available on Windows 10/11 Pro/Enterprise. Hyper-V functions as a Type 1 hypervisor, installing directly on bare-metal hardware and offering functionality comparable to major players like VMware. Its main advantage is deep integration with the Microsoft ecosystem, making it a natural choice for administrators and businesses running Windows-based infrastructure.


Key Features and Advantages of Hyper-V

Hyper-V provides all the essential tools for building and managing virtualized environments, with a focus on simplicity and Windows integration.