diff --git a/public/blog/feed.xml b/public/blog/feed.xml index 59db1a7..e34077f 100644 --- a/public/blog/feed.xml +++ b/public/blog/feed.xml @@ -100,7 +100,7 @@ headscale in a little more detail, which might be worth checking out.</p post, and the inspiration for this one came seemingly randomly - I hope someone finds this useful.</p> <div class="footnote-definition" id="1"><sup class="footnote-definition-label">1</sup> -<p>Naturally, you shouldn't just copy and paste the snippets into</p> +<p>Naturally, you shouldn't just copy and paste the snippets into your own config. Do your research first!</p> </div> diff --git a/public/blog/home-server-security/index.html b/public/blog/home-server-security/index.html index beb8c41..9cc39db 100644 --- a/public/blog/home-server-security/index.html +++ b/public/blog/home-server-security/index.html @@ -19,4 +19,4 @@ }; }; }; -
  • This probably doesn't need to be said, but use strong passwords!

  • Host a fail2ban instance to ban hosts making bruteforce attempts.

    I think that's all there is for almost everyone, and is basically the minimal amount of effort a home server administrator should do. Personally, I would prefer to enforce a VPN connection in order to access my personal services for that extra layer of security (because why'd they need to be exposed to the internet?). This can be done faily easily with tailscale, and for the slightly more paranoid - headscale is a viable...alternative? Anyways, I've got a blog post that explores headscale in a little more detail, which might be worth checking out.

    Well, that's all I wanted to say. It's been a while since my last blog post, and the inspiration for this one came seemingly randomly - I hope someone finds this useful.

    1

    Naturally, you shouldn't just copy and paste the snippets into

    \ No newline at end of file +
  • This probably doesn't need to be said, but use strong passwords!

  • Host a fail2ban instance to ban hosts making bruteforce attempts.

    I think that's all there is for almost everyone, and is basically the minimal amount of effort a home server administrator should do. Personally, I would prefer to enforce a VPN connection in order to access my personal services for that extra layer of security (because why'd they need to be exposed to the internet?). This can be done faily easily with tailscale, and for the slightly more paranoid - headscale is a viable...alternative? Anyways, I've got a blog post that explores headscale in a little more detail, which might be worth checking out.

    Well, that's all I wanted to say. It's been a while since my last blog post, and the inspiration for this one came seemingly randomly - I hope someone finds this useful.

    1

    Naturally, you shouldn't just copy and paste the snippets into your own config. Do your research first!

    \ No newline at end of file