Reverse SSH Tunnelling over SSL with the Raspberry Pi

In this blog I will go through the steps necessary to set-up an automatic reverse SSH tunnel between a client machine sitting in a restricted environment and a server that you control in your home/office/cloud. The reverse SSH tunnel will be encapsulated within a SSL tunnel over port 443 to evade network security appliances/firewalls.


How to Boost your Wireless Strength with DD-WRT

If you have a DD-WRT powered router then you already know how powerful and feature-full it is, compared to a standard out-of-the-box ISP provided router.

This article will be about making use of the features that DD-WRT provides out of the box, as well as some other ‘hacks’ we can use to boost the wireless signal in your home or office.
The ones I will talk about today are as follows (in order of usefulness and ease):

  1. Wireless channel selection
  2. Update firmware and/or drivers!
  3. Transmit (Tx) Power
  4. Beacon Interval

Quick and Easy Tutorial on Installing and Configuring fail2ban on an Amazon EC2 Instance

This article will serve as a quick tutorial on installing and configuring fail2ban on an Amazon EC2 instance.

I like to think of fail2ban as a ‘second line’ of defence against systematic attempts to break through and access SSH on a server.
First line of defence should always be disabling the root log-in, using strong passwords/using private keys for log-on, etc.
It can do a lot more than protecting against brute-force SSH attacks using regex’s but that is not in the scope of this tutorial.