Austin Songer
  • Home
  • Compliance Products
  • My Small Bio
Sign in Subscribe

ssh

Understanding and Simulating SSH Backdoors
ssh

Understanding and Simulating SSH Backdoors

SSH (Secure Shell) is one of the most widely used protocols for
Read More
Azure Networking - Ensure that SSH Access is Restricted from the Internet
Network Security Group

Azure Networking - Ensure that SSH Access is Restricted from the Internet

Overview: Disable SSH access on network security groups from the Internet. Why:
Read More
Austin Songer
Amazon Web Services: Install an Intrusion Prevention System (IPS) on an EC2 Instance
Amazon Linux AMI

Amazon Web Services: Install an Intrusion Prevention System (IPS) on an EC2 Instance

Intall fail2ban on first instance SSH into first instance as cloud_user
Read More
Austin Songer
Google Cloud Security: Creating Firewall Rules on a VPC Network
22

Google Cloud Security: Creating Firewall Rules on a VPC Network

I will configure two different firewall rules: (1) to allow SSH access
Read More
Austin Songer
Austin Songer © 2025
Powered by Ghost