Logo
Login
Tech Posts 31382
100daysofcode 100daysofdevops 100pay 10mistakes 10yearworkanniversary 11 11labs 11tly 11ty 127001

Dev Blog A constructive and inclusive blog for software developers. With you every step of your journey.

Built with modern PHP and MySQL. Open source software that powers developer blogs and other inclusive communities.

Made with love and PHP. Dev Blog © 2024.

Expose local dev server with SSH tunnel and Docker

Expose local dev server with SSH tunnel and Docker
Introduction Most consumer-grade internet connections are hidden behind CG-NAT and are not reachable from the internet. This is done to save IP addresses, as IPv4 has a limited range. If you ...
23.04.2025 0 Read More

A Simple Guide to SSH in Red Hat Linux: Why It’s Important and How It’s Used in Cloud, Servers, and Remote Work

If you've ever heard about SSH and wondered why it’s such a big deal, you’re in the right place! SSH, which stands for Secure Shell, is one of the most powerful tools in Linux, especially in Red H...
23.04.2025 0 Read More

Allow SSH tunnelling for Docker MySQL

Allow SSH tunnelling for Docker MySQL
MySQL Docker images usually come without SSH connection. It's fine for apps to connect within an internal network, but need additional work to have SSH connection to access it remotely. Overvi...
04.05.2025 0 Read More

How to Set a Static IP for Your Fedora VM: A Step-by-Step Guide

How to Set a Static IP for Your Fedora VM: A Step-by-Step Guide
An important and helpful step before diving into any project is to assign a static IP to your VM.This ensures that you don’t have to repeatedly check the server IP for SSH access or modify your auto...
03.05.2025 0 Read More

Advanced SSH Security Practices in Red Hat Linux

Securing SSH is crucial for protecting servers, cloud instances, and remote systems from unauthorized access. Here are the best security practices to follow when using SSH in Red Hat Linux. 1....
24.04.2025 0 Read More

Troubleshooting SSH Issues in Red Hat Linux

SSH is essential for securely managing remote systems, but sometimes it can fail due to misconfigurations, network problems, or security settings. Here’s a step-by-step guide to diagnosing and fixin...
25.04.2025 0 Read More

Limiting SSH Access with TCP Wrappers, AllowUsers, and IP Restrictions

Securing SSH access is a crucial step in hardening your Linux servers. In our previous discussion, we highlighted the importance of SSH as a secure communication protocol and introduced the sshd_confi...
27.04.2025 0 Read More

5 More Techniques to Lock Down Public-Facing Linux Servers | by Faruk Ahmed | Apr, 2025

Member-only story 5 More Techniques to Lock Down Public-Facing Linux Servers --Share(Before this read: 5 Linux Hardening Techniques I Apply Before Hosting Any Website) ✍️ Full Blog...
28.04.2025 0 Read More

7 Linux Security Mistakes I Made (So You Don’t Have To) | by Faruk Ahmed | Apr, 2025

Member-only story 7 Linux Security Mistakes I Made (So You Don’t Have To) --Share Intro: When I started managing Linux servers, I focused on speed over safety. I just wanted things t...
28.04.2025 0 Read More

🔐How to Fix GitHub Authentication Failed: Switch from Password to Token or SSH

If you've recently tried to push code to a private GitHub repository using HTTPS and encountered an error like this:fatal: HttpRequestException encountered. An error occurred while sending the requ...
01.05.2025 0 Read More
Loading...
#reading
Three years after a branch to Data Analytics: How Extracurriculars Shaped My Career
0
Why You’re Not Getting TikTok Verification Emails (and How to Fix It!)
0
My Study Process for the AWS Cloud Practitioner Certification
0
Why Was My TikTok Account Flagged as a "Spam Account"?
0
How to Contact Lazada Customer Service via Email: A Quick Guide
0
#popular
Mastering OpenAI’s new Agents SDK & Responses API [Part 1]
0
What is Model Context Protocol (MCP): Explained in detail
0
Beginner's Guide to the Model Context Protocol (MCP)
0
A Step-by-Step Guide to Install DeepSeek-V3-0324 Locally
0
How to Run DeepSeek Locally Using Ollama
0