LowEndBox - Cheap VPS, Hosting and Dedicated Server Deals

Locking Down Access to Your VPS

Tags: , , , Date/Time: October 12, 2021 @ 12:00 am, by raindog308

There are a number of ways you can restrict access to your VPS. Passwords (specifically, good passwords) is the most basic method. Restricting access to ssh keys only is better. You can use Google Authenticator to require a short-lived number as a second factor of authentication. You could also setup a VPN so that only […]

Incremental Remote Backups Using rsnapshot

Tags: , , , , , Date/Time: April 17, 2021 @ 12:00 am, by raindog308

There’s an old adage about backups: There are two kinds of people: people who’ve never lost data, and people who’ll never lose data again. If you’ve ever experienced data loss, you will instantly become passionate about backups.  To prevent bad experiences with your data, you want backups that are comprehensive, manageable, versioned, automated, and secure.  […]

Generating and Using SSH Keys, Part 3

Tags: , , , , , Date/Time: September 26, 2020 @ 6:02 am, by raindog308

In previous tutorials in this series, we went over generating SSH keys and how to use them.  We’ll wrap up the series by showing you how to turn off password authentication on your server. Why Configure for SSH Key Authentication Only As mentioned in Part 1, SSH key authentication requires both “something you know” (the […]

Generating and Using SSH Keys, Part 2

Tags: , , , , , Date/Time: September 19, 2020 @ 5:00 am, by raindog308

In the previous tutorial, we showed you how to generate an SSH key pair.  In this tutorial, we’ll show you how to use it to login. Assumptions In this tutorial: Your ssh key file is called “my-ssh-key”. The server is “myserver.example.com” and your user account there is “example”. SSH is running on port 22, the […]

Generating and Using SSH Keys, Part 1

Tags: , , , , Date/Time: September 12, 2020 @ 6:58 am, by raindog308

Traditionally, authentication in Unix-based systems is done with passwords.  This tests “something you know”.  SSH keys offer a higher level of security by adding “something you have”- in this case, an SSH private key file.   Even if an attacker was to guess your SSH passphrase, without the SSH private key file, this knowledge is […]

How to Setup SFTP to Securely Transfer Files on CentOS 7

Tags: , , , Date/Time: April 28, 2019 @ 6:11 am, by Ryan Flowers

Welcome to another LowEndBox tutorial. We’re going to explore the world of SFTP: What it is, isn’t, how to use it and why. Let’s get to it! What is SFTP? We’re glad you asked! SFTP is the Secure File Transfer Protocol. All that means is that it’s a File Transfer Protocol that is Secure (Encrypted). […]

Configuring Virtualmin on CentOS 7 for Website Hosting: Part 1

Tags: , , , , , , , , , , , , , Date/Time: April 12, 2019 @ 9:54 am, by Ryan Flowers

In the professional Linux web hosting world, cPanel rules as king. That’s not necessarily a bad thing! cPanel is rich in features and is for the most part stable and reliable. But it’s also completely unsuitable for a small, inexpensive VPS that you’d find here at LowEndBox.  Most likely the cPanel license will cost significantly more than […]

Configuring Virtualmin on CentOS 7 for Website Hosting: Part 2

Tags: , , , , , , , , , , , , , Date/Time: April 12, 2019 @ 9:53 am, by Ryan Flowers

In Part 1 of our tutorial, we installed Virtualmin on CentOS 7 and did some basic configuration. In this second half, we’re going to dive deep into the Linux configuration files to optimize our new server for a low memory footprint. We’re also going to make sure we have a modern version of PHP installed […]

Linux Blackhole Tutorial – Adding and Removing A Null Route

In the world of systems administration, having the commands to add or remove a blackhole / nullroute a host or problematic IP address can be very useful. So in this simple, yet useful tutorial, we’ll cover how to exactly go about doing this on nearly any type of Linux OS! How to add a blackhole […]

Using SSH Keys to connect to your VPS

Tags: , , , , Date/Time: April 2, 2019 @ 9:29 am, by Ryan Flowers

In the days before Virtualization emerged, servers could only be built using physical hardware. A server admin would build a server, plug in a keyboard and monitor, and install Linux via CD or over the network. Once the server was online they could go back to their workstation and fire up a terminal emulator that […]

Older Posts »