I ran an SSH Honeypot for 3 months - Here is what attacked it

- Posted in IT Security by
So, I did a thing. As you probably already know from my other blog entry on how to setup an SSH honeypot, I've been running SSHesame to see what the internet throws at an exposed SSH server. I left [...] Read more

Expanding your linux VM Disk: Resize LVM partition without creating a new one

- Posted in How To by
Below is a friendly, step-by-step guide to resizing a Linux VM’s disk without creating a new partition. We’ll walk through extending the last partition on a disk, resizing a Physical Volume (PV), [...] Read more

Limit CPU, Memory, and Other Resources for a Service Using systemd

- Posted in How To by
Occasionally, you might encounter a service that unexpectedly gobbles up your system's resources. For example, I once set up an SSH honeypot to capture malicious bot activity—but when random bots [...] Read more

Remove sensitive (personal) headers from postfix emails

- Posted in How To by
When I first set up my email server to handle messages for my domains, I noticed a concerning issue: the outgoing email headers included sensitive information, such as my home IP address and the [...] Read more

Set up a SSH honeypot with logging on your linux server

- Posted in How To by
Setting up a honeypot on your server can be an effective way to monitor, log, and analyze potential attacks, as well as learn about common hacking techniques. By setting up a honeypot, you can create [...] Read more