So, I did a thing. As you probably already know from my other blog entry on how to setup an SSH honeypot, I've been running SSHesame to see what the internet throws at an exposed SSH server. I left [...] Read more
Below is a friendly, step-by-step guide to resizing a Linux VM’s disk without creating a new partition. We’ll walk through extending the last partition on a disk, resizing a Physical Volume (PV), [...] Read more
Occasionally, you might encounter a service that unexpectedly gobbles up your system's resources. For example, I once set up an SSH honeypot to capture malicious bot activity—but when random bots [...] Read more
When I first set up my email server to handle messages for my domains, I noticed a concerning issue: the outgoing email headers included sensitive information, such as my home IP address and the [...] Read more
Setting up a honeypot on your server can be an effective way to monitor, log, and analyze potential attacks, as well as learn about common hacking techniques. By setting up a honeypot, you can create [...] Read more