Cover Image taken down by the Google Blogger platform

April 7, 2022 - Reading time: 4 minutes

One of the most widely known Cyber Security Blogs "" has been suspended on Friday Afternoon (22.10.2021) by the Google Blogger platform. 

The Website was founded by Mohit Kumar, and is one of the most trusted sites among the Cybersecurity Community across the globe. The company claims it has a traffic volume of almost 10 million monthly readers.

On 22.10.2021 users were greeted with the following error page:

The team behind confirmed the suspension in the following tweet: URGENT HELP REQUIRED (from Google’s Blogger Team) Google, for unknown reasons, has deleted from its service, leaving us with no backups. Please help us get in touch with the right person at Google @paul_irish @mattcutts @mathias @natashenka @maddiestone — The Hacker News (@TheHackersNews) October 22, 2021

TheHackerNews team notified that their website, which was hosted on Google’s Blogger Platform, had been removed without any reason and they had no backups of their content in any form. The team behind was looking for help from Blogger Team.


The Website is up again, but the reason for the suspension is still unknown.

Cover Image

Protect your Linux SSH Login

March 31, 2022 - Reading time: 10 minutes

Maybe you noticed in your /var/log/auth.log file, that there are many failed login attempts on your Linux server. These attempts are usually brute force attacks to gain access to your server. Brute force stands simple for trying different username and password combinations until one of them works.

How can I protect my server against these attacks?

First of all it's important that you use a secure password (which is generally important for every online login). Secure in this case stands for long and complex.

Additionally the utility fail2ban is one of the best ways to protect your SSH login. The utility can be installed on all kind of Linux distros. The main task of the program is to ban IP-Addresses when they failed the login x times for a duration of y minutes. x stands for a defined amount of failed attemps and y stands for a amount in minutes.
To install the tool you can use one of the following commands:

Ubuntu/Debian based
apt-get install fail2ban
yum install fail2ban

Now the utility is already working. In the file /etc/fail2ban/jail.conf we can configure the ban time and the amount of failed attempts.

# "bantime" is the number of seconds that a host is banned.
bantime  = 120m
# A host is banned if it has generated "maxretry" during the last "findtime"
findtime  = 1440m
# "maxretry" is the number of failures before a host get banned.
maxretry = 5


Welcome to!
This Blog is about all kind of IT related stuff.