Compare commits

..

15 Commits

11 changed files with 193 additions and 10 deletions

View File

@ -1 +1 @@
{"taxonomy":{"tags":["comment-system","hello","privacy","remark42","self-hosted","test","world"],"categories":[]}}
{"taxonomy":{"tags":["comment-system","hello","principles","privacy","remark42","self-hosted","test","world"],"categories":[]}}

View File

@ -0,0 +1,28 @@
---
title: "Part 1: Getting Started with Python"
description: Kick off your Python journey! Learn what Python is, set up your environment, and write your first program. Perfect for beginners—lets start coding!
date: 2025-02-02T16:59:46.763Z
tags: []
categories: []
image:
path: /assets/img/posts/python-getting-started.png
disable-ty: false
series: "Python Practical Guide: A Beginner's Journey"
slug: part-1-started-python
---
## What is Python?
Python is a versatile, high-level programming language known for its simplicity and readability. Its used for:
- Web development
- Data analysis and visualization
- Artificial intelligence and machine learning
- Automation and scripting
- Game development
- And much more!
## Why Learn Python?
1. **Beginner-Friendly**: Easy-to-read syntax makes it perfect for first-time coders.
2. **Versatile**: Use it for almost any type of project or industry.
3. **In-Demand Skill**: Python developers are highly sought after in the job market.
4. **Huge Community**: Tons of resources, libraries, and frameworks to help you learn and grow.
5. **Fun and Powerful**: Automate tasks, analyze data, or build apps—Python makes it easy!

View File

@ -0,0 +1,12 @@
---
title: "Part 2: Python Basics - Syntax and Fundamentals"
description: "Learn Pythons building blocks: variables, data types, input/output, and basic operations. Start writing clean, readable code today!"
date: 2025-02-02T18:04:14.853Z
tags: []
categories: []
image:
path: /assets/img/posts/python-logo.jpg
disable-ty: true
series: "Python Practical Guide: A Beginner's Journey"
slug: part-2-python-basics-syntax-fundamentals
---

View File

@ -37,7 +37,6 @@
.then(function (result) {
if (result != "N/A") {
var response = JSON.parse(result);
setPostMetrics(response);
if(!response.postExists){
postDetails.likes = postDetails.views = postDetails.comments = 0;
if(Number(likes.innerText) !== NaN){
@ -49,15 +48,15 @@
if(postDetails.modifiedDate === ""){
postDetails.modifiedDate = postDetails.createdDate;
}
}
ajax(serviceUrl + "/CreatePost", "POST", postDetails)
ajax(serviceUrl + "/CreatePost", "POST", postDetails)
.then(function (result) {
if(result != "N/A"){
var response = JSON.parse(result);
setPostMetrics(response);
}
});
}
}
});

View File

@ -1,8 +1,4 @@
<style>
main h3 {
margin: 10px
}
#post-series {
margin-top: 25px;
}
@ -17,7 +13,7 @@
<div id="post-series">
<div class="card">
<div>
<h3>{{ page.series }}</h3>
<h3>{{ page.series }} ({{ posts | size }} - Part Series)</h3>
<ol>
{% assign posts = site.posts | where: "series", page.series | sort: "date" %}
{% for post in posts %}

View File

@ -1,6 +1,6 @@
---
title: SOLID Principles
description: Solid Principles
description: The SOLID principles are a set of design principles aimed at improving software quality, making it easier to understand, extend, and maintain.
date: 2024-04-03T16:10:57.476Z
tags:
- code quality

View File

@ -0,0 +1,143 @@
---
title: "Keep Your Linux System Secure: A Beginners Guide to UFW"
description: UFW is a tool that helps you decide which connections can or can't access your Linux system. It's simple enough for beginners but also has features for experts.
date: 2025-01-01T17:48:18.319Z
tags:
- firewall
- linux
- security
- ufw
categories:
- Linux
- Firewall
image:
path: /assets/img/posts/ufw-logo.jpg
alt: A Beginner's Guide to UFW (Uncomplicated Firewall)
slug: ufw-guide
---
UFW (Uncomplicated Firewall) is a powerful yet user-friendly tool that allows you to control which connections can access your Linux system. Designed with simplicity in mind, its perfect for beginners while still offering advanced features for experienced users. In this post, well explore how UFW works, how to use it effectively, and why its an essential tool for securing your system.
When it comes to securing your Linux server or desktop, managing network access is one of the most critical tasks. Firewalls serve as the first line of defense, and while tools like iptables offer granular control, they can be intimidating for beginners. Thats where UFW (Uncomplicated Firewall) steps in.
UFW is a user-friendly interface for managing iptables, designed to simplify the process of configuring a firewall. Whether youre a seasoned Linux administrator or a newcomer, UFW makes securing your system straightforward and efficient.
## Why Use UFW?
1. **Ease of Use:** UFW abstracts the complexities of iptables, offering simple commands to configure firewall rules.
2. **Default Settings:** UFW ships with sensible defaults, such as denying all incoming connections while allowing outgoing ones.
3. **Integration:** It integrates well with many linux distributions and is often installed by default.
4. **Script-Friendly:** UFW is ideal for automation and scripting, making it perfect for managing servers at scale.
## Installing UFW
Most modern Linux distributions come with UFW pre-installed. If its not already on your system, you can install it with the following commands:
For Ubuntu/Debian:
```terminal
sudo apt update
sudo apt install ufw
```
For CentOS/RHEL:
```terminal
sudo yum install epel-release
sudo yum install ufw
```
For Arch Linux:
```terminal
sudo pacman -S ufw
```
## Basic UFW Commands
### Enable UFW
Before configuring UFW, you need to enable it:
```terminal
sudo ufw enable
```
### Check UFW Status
To see whether UFW is running and view current rules:
```terminal
sudo ufw status
```
### Allowing connections
To allow traffic on a specific port, use the `allow` command. For example, to allow SSH connections:
```terminal
sudo ufw allow ssh
```
Or, specify the port number:
```terminal
sudo ufw allow 22
```
### Denying Connections
To block traffic on a specific port:
```terminal
sudo ufw deny 80
```
### Removing Rules
To delete a rule, prepend the rule with `delete`. For example:
```terminal
sudo ufw delete allow 22
```
Or Remove a rule by its number
List UFW Rules with Numbers
```terminal
sudo ufw status numbered
```
Example output
```terminal
Status: active
To Action From
[ 1] 22/tcp ALLOW Anywhere
[ 2] 80/tcp ALLOW Anywhere
[ 3] 22/tcp (v6) ALLOW Anywhere (v6)
[ 4] 80/tcp (v6) ALLOW Anywhere (v6)
```
Delete the Rule by Number
```terminal
sudo ufw delete 2
```
### Resetting UFW
To reset UFW to its default state, removing all rules:
```terminal
sudo ufw reset
```
## Advanced Usage
### Limiting Connections
To protect against brute-force attacks, you can limit connections by using `limit` rule in UFW. This rule restricts the rate of new connections from the same IP address, allowing only a limited number of connections per minute (default: 6 attempts within 30 seconds). You can adjust these values by modifying the UFW configuration files, typically found in `/etc/ufw/` or `/etc/ufw/ufw.conf`, or by customizing rate limits using iptables rules directly. within a specified time frame. For instance, to limit SSH attempts, you can execute:
```terminal
sudo ufw limit ssh
```
This helps to deter malicious actors trying to gain unauthorized access to your system by repeatedly guessing passwords or exploiting vulnerabilities.
### Allowing Specific IP Addresses
To allow traffic from a specific IP address:
```terminal
sudo ufw allow from 192.168.0.100
```
Allowing Traffic to a Specific Port and IP
For more granular control, you can specify both source IP and destination port:
```terminal
sudo ufw allow from 192.168.0.100 to any port 22
sudo ufw allow from 192.168.0.0/24 to any port 22 proto tcp
```
### Using Application Profiles
UFW supports application profiles to simplify rule management for common services. List available profiles with:
```terminal
sudo ufw app list
```
To allow a specific application, UFW provides predefined profiles for commonly used software and services. These profiles encapsulate the necessary port and protocol details, simplifying firewall configuration. For instance, to permit traffic for an application like Apache, you can execute:
```terminal
sudo ufw allow 'Apache Full'
```
This command enables both HTTP (port 80) and HTTPS (port 443) traffic, as defined in the application profile.
## Best Practices
1. **Start with Defaults:** UFW's default policy denies incoming traffic and allows outgoing traffic, a good starting point for most setups.
2. **Enable Logging:** Turn on logging to monitor blocked traffic:
```terminal
sudo ufw logging on
```
3. **Test Rules:** Before applying complex rules on a production system, test them in a safe environment.
4. **Document Changes:** Keep a record of the rules you add or remove to make troubleshooting easier.
## Conclusion
UFW makes it easy to manage your firewall, even if youre new to Linux. By learning its simple and advanced features, you can protect your system without the hassle of complicated tools like iptables. Whether youre using one computer or many servers, UFW is a great tool to keep things secure.

Binary file not shown.

After

Width:  |  Height:  |  Size: 53 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 23 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 38 KiB

View File

@ -49,6 +49,11 @@
"title": "disable-ty",
"name": "disable-ty",
"type": "boolean"
},
{
"title": "series",
"name": "series",
"type": "string"
}
]
}