cm0002@lemmy.world to cybersecurity@infosec.pub · 6 months agoHandling malicious requests with fail2bansergiocipriano.comexternal-linkmessage-square3linkfedilinkarrow-up17arrow-down10
arrow-up17arrow-down1external-linkHandling malicious requests with fail2bansergiocipriano.comcm0002@lemmy.world to cybersecurity@infosec.pub · 6 months agomessage-square3linkfedilink
minus-squareadminofoz@lemmy.cafelinkfedilinkarrow-up1·6 months agoFr tho why does no one do port knocking? I know its not a comprehensive solution but it’s a pretty cool component imo.
minus-squareAjen@sh.itjust.workslinkfedilinkarrow-up1·6 months agoPort knocking is cool, but tunneling everything through ssh or a VPN (with strong keys, not passwords) is more secure.
deleted by creator
Fr tho why does no one do port knocking? I know its not a comprehensive solution but it’s a pretty cool component imo.
Port knocking is cool, but tunneling everything through ssh or a VPN (with strong keys, not passwords) is more secure.
deleted by creator