And only fits a small, limited # of people. It's fine and dandy if you only log into it from 1 or two places.... but for my servers, I may have to be logging in from a client location that I don't know the IP of beforehand, I may have to be logging in via my cellular service. Could I set up a VPN to do it. Yep, but that in and of itself is another ball of wax.If you have a static IP, those ports should be closed to everyone except you. Check your firewall documentation about how to block those ports.
That just scratches the surface of what can be done.
It boils down to how far you want to go.And only fits a small, limited # of people. It's fine and dandy if you only log into it from 1 or two places.... but for my servers, I may have to be logging in from a client location that I don't know the IP of beforehand, I may have to be logging in via my cellular service. Could I set up a VPN to do it. Yep, but that in and of itself is another ball of wax.
For SSH, better than restricting ports to a specific IP is using keys and also 2 factor authentication. That way, you can access from your known computer with no problems - but also access it from remote locations utilizing the 2 factor authentication routines.
Same with the email - I may be the only one with an account - but my phone is set up to access those emails also - and guess what, Verizon doesn't give me a static IP for that ability.
There are ways you can mitigate it... but you will NEVER totally eliminate it.
Works until you have a dedicated server that not only provides VPS services for you, but for several other users. THEN you don't have the luxury of going "Oh well, it can wait a few days".And if I'm away from this computer for any length of time, I am not available. There's nothing so important that it can't wait a day or two to be solved.
You can dig it 200 feet deep and it will still be able to be hacked by someone. I don't care how "smart" someone is on their coding... there is always someone else out there smarter. Used to the only way you could be assured of not getting hacked was not being networked... but even that doesn't apply now.That's why I originally said it only scratches the surface of what can be done.
The ultimate security is to not own a server.
It's all downhill from there.
disable_functions = "passthru,ini_set,shell_exec,eval,popen,exec,dl"
I read an article before, I thought the advisable port is below 1024.Switch SSH to another port above 1024
This is true. Running sshd on a non-privileged port >1024 is actually a bigger security risk, because it makes it easier to attack sshd with fake daemons (binding to a port >1024 doesn't need a root exploit in the first place, that's why it's a bad idea to do that).I read an article before, I thought the advisable port is below 1024.
I read an article before, I thought the advisable port is below 1024.
We use essential cookies to make this site work, and optional cookies to enhance your experience.