2025-10-23
Hello! If you’re new to the world of remote server administration, you’re probably familiar with SSH — a reliable tool for connecting to remote machines. But what do you do when the connection is unstable: Wi‑Fi drops, you switch to mobile data, or your laptop “sleeps”? This is where Mosh (Mobile Shell) comes in — a “mobile shell” that makes remote work comfortable even in poor conditions.
In this article we’ll look at what Mosh is, why it’s better than SSH in certain scenarios, how to install and use it. Everything simple and step‑by‑step — for absolute beginners. Let’s get started!
2025-09-29
Introduction
In previous articles, we explored different file transfer protocols — from classic FTP and SFTP to modern solutions like S3 and WebDAV.
Now let’s take a closer look at Rsync — a powerful tool and protocol that stands out for its efficiency in synchronizing files and directories.
Rsync is perfect for backups, data synchronization, and automation tasks, thanks to its ability to transfer only the modified parts of files.
2025-09-25
Introduction
In addition to “heavyweights” like SFTP, there are simpler, narrow-purpose protocols.
They aren’t meant for everyday file sharing, but are indispensable in their niches.
In this article, we’ll look at two such tools: TFTP and SCP.
TFTP (Trivial File Transfer Protocol) — maximum simplicity
As the name suggests, TFTP is a “trivial” or simplified version of FTP. Its main goal is to be as lightweight and easy to implement as possible.
2025-09-24
Introduction
After we figured out insecure FTP, it’s time to meet its secure successors.
Here’s where confusion often arises: many people think FTPS and SFTP are the same thing.
In reality, these are two completely different protocols — with different histories and principles of operation.
What is FTPS? (FTP + Security)
FTPS (FTP over SSL/TLS) is a direct evolution of classic FTP. It takes standard FTP and “wraps” its connections in the cryptographic protocol SSL/TLS (the same one that protects websites via HTTPS).
2025-08-12
Introduction: Server Security — The First Line of Defense
Once you deploy any server or virtual machine, one of the first and most important tasks is ensuring its security. Even if your server doesn’t contain critical data, it can still be targeted by automated bots constantly scanning the internet for vulnerabilities. The most common type of attack against any server is brute-force password guessing, typically aimed at SSH access, FTP services, or web control panels.
2025-07-16
In a world where cyberattacks are becoming increasingly sophisticated, protecting remote access to servers and network equipment is of paramount importance. Simply opening ports for SSH, RDP, or web interfaces makes them targets for constant scanning and brute-force attacks.
Today, we’ll explore a powerful yet lesser-known technique that significantly improves the security of your MikroTik (and not only): Port Knocking. It’s not just about “closing ports,” but a smart system that makes your services invisible to most scanners and bots.