From e5fb61b16ef8ecdd8895d13d48b1bc5b88054310 Mon Sep 17 00:00:00 2001 From: Muhammad Nauman Raza Date: Fri, 24 May 2024 13:04:53 +0100 Subject: [PATCH] zola: build --- public/blog/feed.xml | 2 +- public/blog/home-server-security/index.html | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/public/blog/feed.xml b/public/blog/feed.xml index 59db1a7..e34077f 100644 --- a/public/blog/feed.xml +++ b/public/blog/feed.xml @@ -100,7 +100,7 @@ headscale in a little more detail, which might be worth checking out.</p post, and the inspiration for this one came seemingly randomly - I hope someone finds this useful.</p> <div class="footnote-definition" id="1"><sup class="footnote-definition-label">1</sup> -<p>Naturally, you shouldn't just copy and paste the snippets into</p> +<p>Naturally, you shouldn't just copy and paste the snippets into your own config. Do your research first!</p> </div> diff --git a/public/blog/home-server-security/index.html b/public/blog/home-server-security/index.html index beb8c41..9cc39db 100644 --- a/public/blog/home-server-security/index.html +++ b/public/blog/home-server-security/index.html @@ -19,4 +19,4 @@ }; }; }; -
  • This probably doesn't need to be said, but use strong passwords!

  • Host a fail2ban instance to ban hosts making bruteforce attempts.

    I think that's all there is for almost everyone, and is basically the minimal amount of effort a home server administrator should do. Personally, I would prefer to enforce a VPN connection in order to access my personal services for that extra layer of security (because why'd they need to be exposed to the internet?). This can be done faily easily with tailscale, and for the slightly more paranoid - headscale is a viable...alternative? Anyways, I've got a blog post that explores headscale in a little more detail, which might be worth checking out.

    Well, that's all I wanted to say. It's been a while since my last blog post, and the inspiration for this one came seemingly randomly - I hope someone finds this useful.

    1

    Naturally, you shouldn't just copy and paste the snippets into

    powered by zola and serene
    \ No newline at end of file +
  • This probably doesn't need to be said, but use strong passwords!

  • Host a fail2ban instance to ban hosts making bruteforce attempts.

    I think that's all there is for almost everyone, and is basically the minimal amount of effort a home server administrator should do. Personally, I would prefer to enforce a VPN connection in order to access my personal services for that extra layer of security (because why'd they need to be exposed to the internet?). This can be done faily easily with tailscale, and for the slightly more paranoid - headscale is a viable...alternative? Anyways, I've got a blog post that explores headscale in a little more detail, which might be worth checking out.

    Well, that's all I wanted to say. It's been a while since my last blog post, and the inspiration for this one came seemingly randomly - I hope someone finds this useful.

    1

    Naturally, you shouldn't just copy and paste the snippets into your own config. Do your research first!

    powered by zola and serene
    \ No newline at end of file