Introduction If you've felt overwhelmed by the Ansible playbooks, Bash scripts, or Python snippets in my previous blogs—don’t worry. This time, we’re focusing solely on the sshd_config file for SSH hardening and configuration. No complex automation, just...
Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
Categories: Cybersecurity
Automating SSH Hardening with Ansible Playbooks
Introduction Getting started with Ansible Building a baseline In a previous blog post, we walked through the essential steps of initial server setup using Ansible, laying the groundwork for secure and automated infrastructure management. Continuing that journey, this...
Linux Firewall Defense: A Scripted Approach to Secure IPTables
Introduction In a previous blog post, I introduced iptables as a foundational tool for Linux firewall management. While understanding the basic syntax is crucial, it's equally important to harden your firewall — reducing your attack surface and enforcing security at...
Linux Firewall: Automatically Ban and Unban IP Addresses with Python
In the world of cybersecurity, quick action can make all the difference. I've just published a new blog post where I share a practical Python script that temporarily bans and unbans IP addresses on a Linux system. It uses UFW as the primary firewall and falls back to...
Asset Security: Understanding Risks, Threats, and Vulnerabilities in a Digital World
🔒 In today's fast-moving digital world, protecting assets isn't optional — it's essential.Understanding risks, threats, and vulnerabilities is the first step to building strong security foundations and responding effectively to the unexpected. 🚀 I just published a new...
Mastering OpenSSH: Secure Remote Access Made Simple
New Blog Post: OpenSSH – Secure Remote Access, Made Simple Whether you're managing a cloud server, configuring remote access to your homelab, or setting up DevOps workflows, OpenSSH is likely at the core of your toolkit. In my latest blog post, I take a practical,...