Featured

Tailscale: A Simpler, Smarter Way to Connect All Your Devices

Tailscale creates a private, encrypted network between your devices using WireGuard under the hood. Instead of “a VPN but complicated,” it acts more like: a mesh of private tunnels with identity-based access (your Google / Microsoft login = your authentication) and automatic NAT traversal (no port-forwarding nightmares) plus support for basically every platform on Earth Everything becomes part of your personal tailnet,  your own secure space. 1. Create your tailnet Go to https://tailscale.com/ Click Sign Up Choose the identity provider you want (Google, Microsoft, GitHub, Apple ID, etc.) That’s it. Your tailnet exists. 2. Install Tailscale on your first device On Windows Download the installer from: https://tailscale.com/download Run the .msi Sign in Approve the device curl -fsSL https://tailscale.com/install.sh | sh sudo tailscale up Then sign in via the browser page that opens. 3. Add your second device Once signed in, both devices will now appear ...

How to Set Up an SFTP Server on Linux

SFTP (Secure File Transfer Protocol) is a secure alternative to FTP, allowing for encrypted file transfers over SSH. It is the preferred method for transferring files securely between machines. 

In Linux, setting up an SFTP server is simple, as it's often built into the default SSH server package. In this guide, we'll walk you through the process of setting up and configuring an SFTP server on Linux.



Most Linux distributions come with the OpenSSH package pre-installed. If it's not, you can easily install it:


For Debian/Ubuntu:


sudo apt update


sudo apt install openssh-server



For CentOS/Red Hat:


sudo yum install openssh-server



For Fedora:


sudo dnf install openssh-server



Configuring SFTP


You don't need to install a separate package for SFTP since it's integrated into the SSH server. However, you might want to configure specific directories for SFTP or restrict users.


To do this, edit the SSH configuration:


sudo nano /etc/ssh/sshd_config



To create an SFTP-only user group and set up a directory for them:


Match Group sftpusers

   ChrootDirectory /sftp/%u

   ForceCommand internal-sftp

   AllowTcpForwarding no

   PasswordAuthentication yes

   PermitRootLogin no



Make sure to create the `/sftp` directory and any user-specific directories within it, adjusting permissions accordingly.



To create an SFTP-only user:


sudo useradd -m -G sftpusers sftpuser

sudo passwd sftpuser

sudo mkdir /sftp/sftpuser

sudo chown sftpuser:sftpusers /sftp/sftpuser





Replace `sftpuser` with your desired username.



After making your configurations, restart the SSH server:


sudo systemctl restart sshd



Connect to your SFTP server using a client or the command line


sftp sftpuser@your_server

If everything is configured correctly, you should be able to log in and transfer files securely.

Comments