// Topic

Security and protection

SSL, hardening, access control, service protection, and secure configurations.

Typical tasks

  • Set up SSL, certificates, and secure connections
  • Restrict access and close unnecessary entry points
  • Harden server and service configuration

// Materials on this topic

Articles and breakdowns

37 articles

2026-01-17

SCA — testing 'third-party' code for vulnerabilities

Imagine you are building a house. You designed the walls yourself, checked every brick, and made sure you didn’t leave the keys in the lock. But what if the concrete you bought from a third-party supplier starts …

2025-11-03

pfSense: a legend proven over decades

pfSense — a tank in the world of firewalls. Is updated less often, but runs for years without surprises. 🏢 Who pfSense is for Corporation with 100+ users Needs official support Has old but reliable hardware Value …

2025-11-02

OPNsense: the firewall of the future that newbies install

OPNsense — it’s like pfSense, but prettier, faster, and with an API. Want an office firewall you wouldn’t be embarrassed to show your boss? Here it is. 💼 Who OPNsense is for Office of 10–50 people VPN for all …

2025-09-24

107 | Battle for Security — FTPS vs SFTP

Introduction After we figured out insecure FTP, it’s time to meet its secure successors. Here’s where confusion often arises: many people think FTPS and SFTP are the same thing. In reality, these are two completely …

2025-08-27

094 | OpenVPN + Keycloak: Modern Authentication

The Problem with Certificates at Scale In previous articles, we discussed that OpenVPN uses certificates for authentication. This method is reliable but has significant drawbacks: Inconvenience for users: Each user must …

2025-08-25

092 | OpenVPN: One Protocol – Different Clients

OpenVPN: A Time-Tested Standard Introduction In a world where the speed and simplicity of WireGuard have become the new standard, OpenVPN remains one of the most reliable and flexible VPN protocols. It works both on …

2025-08-23

091 | DIY Mesh VPN: Headscale and Self-Managed WireGuard

When Control Matters Most Services like Tailscale and NetBird are convenient, but they rely on a third-party control server responsible for authentication, key distribution, and route exchange. For those who, for …

2025-08-18

086 | Keenetic as a VPN Client: Securing Your Network

Keenetic as a VPN Client: Network-Wide Protection Why Use a Router-Level VPN Client? Setting up a VPN client on every individual device can be tedious. Moreover, many devices (Smart TVs, gaming consoles, IoT gadgets) …

2025-08-12

080 | Classic Brute-Force Protection: Fail2ban

Introduction: Server Security — The First Line of Defense Once you deploy any server or virtual machine, one of the first and most important tasks is ensuring its security. Even if your server doesn’t contain critical …

2025-08-10

078 | Xen: A Flexible Hypervisor for Complex Tasks

What is Xen? Xen is a powerful and flexible Type 1 open-source hypervisor that runs directly on server hardware, delivering high performance. Its unique architecture, based on the concept of paravirtualization, became …

2025-07-04

042 | Website Control Panels: Your Key to Easy Hosting

Introduction: Why Do You Need a Website Control Panel? Imagine you’ve bought a piece of land and built a house on it (your website). Now you need to manage the house: connect electricity (domains), install plumbing …