Using SSH tunnels for remote debugging in Xojo

Without appropriate measures, the Internet is an unsafe playground for any developer. Implementing certificates correctly is not necessarily the easiest task, and built-in protection is of course worth nothing if it is not also implemented correctly. The simplest protection is to shield the productive server to be used very well and, if possible, not opening it at all. Often, as a beginner, you are tempted to open the ports for the database, at the latest when your program does not work properly on the productive machine, but you want to debug your solution. ...

February 9, 2022 · 3 min

How To Configure fail2ban

What is fail2ban all about? Fail2ban determines the IP addresses in the server’s log files that are noticeable due to unusual behaviour, such as repeatedly trying to log in with an incorrect password. When a certain number of unsuccessful attempts happened, fail2ban will automatically ensure that the IP address is banned or blocked for a predetermined time. The administrator can also configure Fail2ban so that a suspicious IP address is first reported to him by email. You have many options here. ...

February 6, 2021 · 2 min

How To Build an SSH Connection from macOS to Linux

Well, there are many reasons why it is cool having the possibility to connect remotely to another server. You’ll need such an option for a secure connection to your remote server to upload files and make changes on your server. But perhaps you are running a remote Database on an external server, and then again, an SSH connection is a must (at least if you want to run things securely). ...

February 5, 2021 · 3 min