In Part 1, we locked down user access and SSH. In Part 2, we layered UFW and DigitalOcean’s cloud firewall on top, and deployed Fail2Ban.
In Part 1, we locked down user access and SSH. In Part 2, we layered UFW and DigitalOcean’s cloud firewall on top, and deployed Fail2Ban.Continue reading on Stackademic » Read More Linux on Medium
#linux