How-To-Secure-A-Linux-Server VS Sandstorm

Compare How-To-Secure-A-Linux-Server vs Sandstorm and see what are their differences.

Sandstorm

Sandstorm is a self-hostable web productivity suite. It's implemented as a security-hardened web app package manager. (by sandstorm-io)
SurveyJS - Open-Source JSON Form Builder to Create Dynamic Forms Right in Your App
With SurveyJS form UI libraries, you can build and style forms in a fully-integrated drag & drop form builder, render them in your JS app, and store form submission data in any backend, inc. PHP, ASP.NET Core, and Node.js.
surveyjs.io
featured
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
How-To-Secure-A-Linux-Server Sandstorm
48 51
16,701 6,636
- 0.2%
4.6 5.4
20 days ago 2 months ago
JavaScript
Creative Commons Attribution Share Alike 4.0 GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

How-To-Secure-A-Linux-Server

Posts with mentions or reviews of How-To-Secure-A-Linux-Server. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-06-27.
  • An evolving how-to guide for securing a Linux server
    1 project | news.ycombinator.com | 25 Jan 2024
  • How to Secure a Linux Server
    1 project | news.ycombinator.com | 8 Jan 2024
  • Should I set up my own server?
    1 project | /r/rustdesk | 8 Dec 2023
    - own server costs about $5/month. I recommend using docker to deploy hbbr and hbbs. Back up the key in case you need to re-deploy. You do need to secure your Linux server, and this community-driven Github guide has some good tips to get started.
  • How-To-Secure-A-Linux-Server: An evolving how-to guide for securing a Linux server.
    1 project | /r/linux | 18 Jul 2023
  • Automating the security hardening of a Linux server
    2 projects | /r/ansible | 27 Jun 2023
    I have been using the How To Secure A Linux Server guide for quite a while and wanted to learn Ansible, so I created two playbooks to automate most of the guides content. The playbooks are still a work in progress.
  • Connecting to docker containers rarely work, including via Caddy (non docker) reverse proxy
    3 projects | /r/selfhosted | 1 Feb 2023
    If it works, I will then follow the hardening guide I did before (https://github.com/imthenachoman/How-To-Secure-A-Linux-Server) and test after every step
  • Resources to learn backend security from scratch
    2 projects | /r/webdev | 24 Dec 2022
    Maybe these two repos can help you, I've used them both from time to time to look up stuff I have no idea about as a frontend main: https://github.com/imthenachoman/How-To-Secure-A-Linux-Server https://github.com/decalage2/awesome-security-hardening
  • Time to start security hardening - been lucky for too long
    1 project | /r/homelab | 9 Oct 2022
  • Ask HN: How can a total beginner start with self-hosting
    21 projects | news.ycombinator.com | 5 Oct 2022
    > In short it’s all about control, privacy, and security, in that order.

    I am going to strongly urge you to consider changing that order and move *security* to the first priority. I have long run my own servers, it is much easier to setup a server with strong security foundation, than to clean up afterwards.

    As a beginner, you should stick to a well known and documented Linux server distribution such as Ubuntu Server LTS or Fedora. Only install the programs you need. Do not install a windowing system on it. Do everything for the server from the command line.

    Here are a few blog posts I have bookmarked over the years that I think are geared to beginners:

    "My First 5 Minutes On A Server; Or, Essential Security for Linux Servers": An quick walk through of how to do basic server security manually [1]. There was a good Hacker News discussion about this article, most of the response suggests using tools to automate these types of security tasks [2], however the short tutorial will teach you a great deal, and automation mostly only makes sense when you are deploying a number of similar servers. I definitely take a more manual hands-on approach to managing my personal servers compared to the ones I professionally deploy.

    "How To Secure A Linux Server": An evolving how-to guide for securing a Linux server that, hopefully, also teaches you a little about security and why it matters. [3]

    Both Linode[4] and Digital Ocean[5] have created good sets of Tutorials and documentation that are generally trustworthy and kept up-to-date

    Good luck and have fun

    [1]: https://sollove.com/2013/03/03/my-first-5-minutes-on-a-serve...

    [2]: https://news.ycombinator.com/item?id=5316093

    [3]: https://github.com/imthenachoman/How-To-Secure-A-Linux-Serve...

    [4]: https://www.linode.com/docs/guides/

    [5]: https://www.digitalocean.com/community/tutorials

  • Selfhosting Security for Cloud Providers like Hetzner
    3 projects | /r/selfhosted | 25 Sep 2022
    I suggest these resources: - Some fundamentals: https://www.cyberciti.biz/tips/linux-security.html - One of the best imho ( exhaustive list ): https://github.com/imthenachoman/How-To-Secure-A-Linux-Server - Ansible playbook to harden security by Jeff Geerling: https://github.com/geerlingguy/ansible-role-security - OAWSP Check list ( targeted for web apps... and honestly a bit overkill ): https://github.com/0xRadi/OWASP-Web-Checklist

Sandstorm

Posts with mentions or reviews of Sandstorm. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-12-31.
  • Website Impersonating a Desktop Environment
    3 projects | news.ycombinator.com | 31 Dec 2023
    Sandstorm really had this kind of feeling. Not that it presented as a desktop environment visually - but it offered a much more integrated “computer” of documents versus silod web site apps where you need to open each site to see the files in the app. https://sandstorm.io/
  • Ask HN: Experience using your user's Google Drive instead of a database?
    5 projects | news.ycombinator.com | 4 Dec 2023
    RemoteStorage https://remotestorage.io/ seems to be trying to do this too

    I also really like the https://sandstorm.io approach which goes a little farther beyond

  • Tech Independence
    5 projects | news.ycombinator.com | 17 Sep 2023
    They tried, it was called sandstorm https://sandstorm.io/
  • Ask HN: WordPress vs. Django/Flask?
    3 projects | news.ycombinator.com | 16 Sep 2023
    I did read from somewhere, that with Wordpress SEO plugins etc some website got to top of search results.

    Those that did website with other tech did not get same results, and thinked how to compete or survive.

    For security, I use Sandstorm https://sandstorm.io fork of WordPress that generates static websites. But that does not work with some interactive plugins.

  • Plunder and Urbit
    2 projects | news.ycombinator.com | 9 Aug 2023
    Urbit made the choice to use a bunch of silly new words for familiar concepts, not because they were inventing something so new that there were no words to describe it, but because they wanted to fool people into thinking that's what they were doing. Actually they just spent 10 years trying to do https://sandstorm.io/, but made it 10 times harder than it needed to be by coming up with a wacky new set of programming languages with silly names for everything.

    That's funny, and it is OK to make fun of it.

  • Cap'n Proto 1.0
    10 projects | news.ycombinator.com | 28 Jul 2023
    I don't work at Cloudflare but follow their work and occasionally work on performance sensitive projects.

    If I had to guess, they looked at the landscape a bit like I do and regarded Cap'n Proto, flatbuffers, SBE, etc. as being in one category apart from other data formats like Avro, protobuf, and the like.

    So once you're committed to record'ish shaped (rather than columnar like Parquet) data that has an upfront parse time of zero (nominally, there could be marshalling if you transmogrify the field values on read), the list gets pretty short.

    https://capnproto.org/news/2014-06-17-capnproto-flatbuffers-... goes into some of the trade-offs here.

    Cap'n Proto was originally made for https://sandstorm.io/. That work (which Kenton has presumably done at Cloudflare since he's been employed there) eventually turned into Cloudflare workers.

    Another consideration: https://github.com/google/flatbuffers/issues/2#issuecomment-...

  • 1Sub.dev – A world where people pay for software
    3 projects | news.ycombinator.com | 26 Jul 2023
  • Sandstorm: Open-source platform for self-hosting web apps
    1 project | /r/patient_hackernews | 5 Jun 2023
    1 project | /r/hackernews | 5 Jun 2023
    1 project | /r/hypeurls | 4 Jun 2023

What are some alternatives?

When comparing How-To-Secure-A-Linux-Server and Sandstorm you can also consider the following projects:

authelia - The Single Sign-On Multi-Factor portal for web apps

yunohost - YunoHost is an operating system aiming to simplify as much as possible the administration of a server. This repository corresponds to the core code, written mostly in Python and Bash.

Gitea - Git with a cup of tea! Painless self-hosted all-in-one software development service, including Git hosting, code review, team collaboration, package registry and CI/CD

NextCloudPi - 📦 Build code for NextcloudPi: Raspberry Pi, Odroid, Rock64, curl installer...

docker-socket-proxy - Proxy over your Docker socket to restrict which requests it accepts

sovereign - A set of Ansible playbooks to build and maintain your own private cloud: email, calendar, contacts, file sync, IRC bouncer, VPN, and more.

PowerDNS - PowerDNS Authoritative, PowerDNS Recursor, dnsdist

Open and cheap DIY IP-KVM based on Raspberry Pi - Open and inexpensive DIY IP-KVM based on Raspberry Pi

debian-cis - PCI-DSS compliant Debian 10/11/12 hardening

DietPi - Lightweight justice for your single-board computer!

lynis - Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.

Ansible-NAS - Build a full-featured home server or NAS replacement with an Ubuntu box and this playbook.