Logo Yanis Gramitzky - Infrastructure & Automation
  • Home
  • More
    About Experiences Skills Education Recent Posts Featured Posts
  • Posts
  • YGIT GmbH
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • Anfänger
  • Ansible
  • Architektur
  • Basics
  • Beszel
  • Compose
  • Containers
  • Content Organization
  • DevOps
  • Dns
  • Docker
  • Email
  • Entwicklung
  • Fastapi
  • Fortgeschritten
  • Fotos
  • Gluetun
  • Grafana
  • Hardening
  • Homelab
  • Htmx
  • Infrastructure
  • Infrastruktur
  • Kubernetes
  • Linux
  • Mailserver
  • Markdown
  • Monitoring
  • Multi-Lingual
  • Netzwerk
  • Pdf
  • Portainer
  • Prometheus
  • Python
  • Reverse-Proxy
  • Security
  • Self-Hosting
  • Sicherheit
  • SSH
  • Ssl
  • Tools
  • Traefik
  • Vpn
Hero Image
Docker Compose Deep Dive: Every Option Explained

What Is Docker Compose? Docker Compose is a tool for defining and running multi-container applications. Instead of typing long docker run commands with dozens of flags, you describe your entire stack — services, networks, volumes, secrets — in a single YAML file. One command (docker compose up) brings everything to life. Compose is the standard way to run local development environments, CI pipelines, and even lightweight production workloads. Understanding its full vocabulary gives you precise control over how your containers behave.

  • Docker
  • Containers
  • DevOps
  • Infrastructure
  • Compose
Thursday, March 19, 2026 | 12 minutes Read
Hero Image
SSH Hardening: Locking Down Your Remote Access

Why Harden SSH? SSH (Secure Shell) is the backbone of remote server administration. It encrypts traffic and provides authenticated access — but out of the box, most SSH daemons ship with settings optimized for compatibility, not security. A default SSH setup is vulnerable to: Brute-force and credential stuffing attacks — automated bots hammer port 22 around the clock Weak cipher suites — legacy algorithms like MD5 and arcfour can be exploited Root login exposure — a compromised root session means total system takeover Password-based auth — passwords can be guessed, leaked, or phished Idle session hijacking — abandoned sessions left open are an open door Hardening SSH is one of the highest-ROI security measures you can take. It reduces your attack surface dramatically with minimal operational overhead.

  • Security
  • SSH
  • Linux
  • Ansible
  • DevOps
  • Hardening
Thursday, March 19, 2026 | 6 minutes Read
Navigation
  • About
  • Experiences
  • Skills
  • Education
  • Recent Posts
  • Featured Posts
Contact me:
  • Yanis@ygramitzky.de
  • AGramOfIT
  • Yanis Gramitzky