Nirjas Jakilim·Apr 11Setting Up CrowdSec on your Linux Server: A Complete GuidePreviously, I wrote about setting up fail2ban to protect your server from malicious attacks and brute-force attempts, which works quite…
Nirjas Jakilim·Mar 30Top SSHD Hardening Tricks I Use to Keep My Server Safe from Brute Force AttacksThe moment you expose your server to the internet with a public IP, if you check the /var/log/auth.log file, you will be in a complete…
Nirjas Jakilim·Mar 28Configuring a Cluster File System on OCI using OCFS2Setting up a shared file system across multiple virtual machines in the cloud can be tricky, but Oracle Cluster File System Version 2…
Nirjas Jakilim·Mar 26Guide to Secure Your Self-Hosted Stacks like Nginx, SSH, & Vaultwarden with Fail2banIf you are self-hosting services and expose them to public interfaces then you already know the anxiety of watching your server logs. The…
Nirjas Jakilim·Mar 26Hardening Nginx: A Practical Guide to Modular Security ConfigurationOut of the box, Nginx is incredibly fast and efficient but it isn’t inherently secure against modern automated attacks like scanners…
Nirjas Jakilim·Jul 19, 2025How to monitor Hazelcast Metrics using JMX exporterAs distributed systems become more complex, monitoring becomes crucial for maintaining application performance and reliability. If you’re…
Nirjas Jakilim·Jul 14, 2025Jenkins Plugin Update Workaround for Offline or Proxy-Restricted EnvironmentsWhen deploying Jenkins in a secure environment — like behind a corporate firewall or proxy, it’s often creates problems in plugin…
Nirjas Jakilim·Jul 27, 2023We know that too many data sources and tag combination can cause performance issues during querying…
Nirjas Jakilim·Jul 27, 2023Getting Started with GitHub ActionsEvery software industry nowadays is adapting continuous integration and continuous delivery (CI/CD) platforms to reduce time and effort in…A response icon1A response icon1