🚀 Instantly Secure and Set Up Your VPS with Hosteon’s Initial VPS Setup Script

Managing a new VPS can be overwhelming, especially when starting with a fresh Linux installation. That’s why we at Hosteons created a smart, interactive script to help new VPS users quickly set up their server with best practices in place—regardless of whether you’re using Ubuntu, Debian, AlmaLinux, CentOS, or Rocky Linux.


🎯 What This Script Does

Our open-source script, initial_vps_setup.sh, automates essential initial tasks, including:

  • 🔐 Creating a new sudo user
  • 📛 Checking if the user already exists and giving the option to update sudo access
  • 🧰 Installing basic tools (curl, wget, git, htop, unzip, etc.)
  • 🧱 Enabling firewall with UFW or firewalld based on your distro
  • 🔐 Optionally generating a secure SSH key pair (displays private + public key for user)
  • 🚫 Option to disable root SSH login
  • ✅ Sets correct permissions and groups

🛠️ Compatible with All Major Linux Distributions

Tested and supported on:

  • Ubuntu
  • Debian
  • AlmaLinux
  • CentOS
  • Rocky Linux

The script auto-detects your OS and executes distro-specific commands where needed.


📜 Easy to Use

Just log in as root on your new VPS and run:

curl -sL https://raw.githubusercontent.com/hosteons/Initial-VPS-Setup-Script-for-Linux/main/initial_vps_setup.sh | bash

You’ll be guided through a few interactive prompts—no manual file editing required.


💻 Example Output and Access Instructions

After setup, you’ll get:

  • Username and SSH access instructions
  • SSH key (if generated)
  • Sample sudo usage instructions like:
sudo apt update
sudo systemctl restart nginx

🔐 Why It Matters

  • Security First: Disabling root login and using SSH keys makes brute-force attacks significantly harder.
  • Consistency: Every VPS is provisioned the same way—ideal for sysadmins managing multiple servers.
  • Time-Saving: No need to copy-paste multiple commands or look up tutorials.

❤️ Built and Maintained by Hosteons

This script is built and maintained by the team at Hosteons as part of our effort to make VPS hosting smoother and safer for everyone.

💾 GitHub Repo:

👉 https://github.com/hosteons/Initial-VPS-Setup-Script-for-Linux

🔐 Automatically Install Fail2Ban with Smart Jail Detection on Your VPS (Script by Hosteons)

Here’s a complete WordPress blog post draft to promote your Fail2Ban Auto-Installer script from GitHub:


🔐 Automatically Install Fail2Ban with Smart Jail Detection on Your VPS (Script by Hosteons)

At Hosteons, we’re committed to making server security easier for everyone. Whether you’re running a small VPS or managing a fleet of Linux servers, protecting against brute-force attacks is critical.

That’s why we’ve created a Fail2Ban Auto-Installer Script that not only installs Fail2Ban but also auto-detects and enables jails for common services like SSHApache, and Nginx — all in one click.

👉 GitHub Repository:

https://github.com/hosteons/Fail2Ban-Auto-Installer-With-Jail


✅ Key Features

  • Installs Fail2Ban on UbuntuDebianAlmaLinux, and CentOS
  • Detects installed services (e.g., sshd, nginx, apache) and enables jails accordingly
  • Skips jails for services not found on the system
  • Handles log file paths intelligently based on distro
  • Verifies and restarts Fail2Ban only if configuration is valid
  • Smart checks if Fail2Ban is already installed
  • Minimal and safe — logs errors clearly

🧠 How It Works

When you run the script:

  1. It detects your Linux OS flavor.
  2. Installs Fail2Ban (if not already installed).
  3. Checks if apache, nginx, or sshd is active.
  4. Adds only the appropriate jails with correct log paths.
  5. Restarts Fail2Ban and confirms its status.
  6. Provides clear output so you know it’s working.

This ensures Fail2Ban doesn’t fail due to missing log files or services — a common issue in manual configurations.


📥 How to Use

  1. Download the script:
wget https://raw.githubusercontent.com/hosteons/Fail2Ban-Auto-Installer-With-Jail/main/fail2ban_auto_installer.sh
chmod +x fail2ban_auto_installer.sh
./fail2ban_auto_installer.sh
  1. That’s it. The script handles the rest!

🚀 Need a Secure VPS?

This script runs perfectly on our KVM VPS and Ryzen VPS plans. Visit hosteons.com to explore secure hosting powered by NVMe SSD and DDoS protection — with native support for IPv6, WireGuard VPN, and more.


🔗 Related Resources

One-Click Linux Malware & Rootkit Scanner Using ClamAV and RKHunter

Secure Your Linux VPS in One Click with Our Rootkit & Malware Scanner

Running a VPS or dedicated server? One of the most overlooked but critical steps is making sure your system is free of rootkits and malware.

To simplify this task, we at Hosteons have released a free and open-source script that automatically installs, updates, and runs malware and rootkit scans using two of the most trusted tools in the Linux ecosystem:

  • ClamAV – an open-source antivirus engine
  • RKHunter – a rootkit scanner that checks for backdoors, local exploits, and suspicious files

🔧 What the Script Does

  • Detects your Linux distribution (Ubuntu, Debian, CentOS, AlmaLinux)
  • Installs ClamAV and RKHunter
  • Automatically updates malware and rootkit signature databases
  • Fixes common errors like WEB_CMD=”/bin/false” in RKHunter config
  • Runs full ClamAV scan
  • Executes a complete RKHunter rootkit check
  • Compatible with minimal or fresh VPS installations

📥 Download and Run

Run the following commands to download and execute:

curl -O https://raw.githubusercontent.com/hosteons/linux-malware-scanner/main/scan.sh
chmod +x scan.sh
sudo ./scan.sh

Or get the full packaged ZIP with README and LICENSE:

👉 Download from GitHub


📋 Output and Logs

  • ClamAV scan will output infected files (if any)
  • RKHunter will show warnings and potential issues
  • All actions run with user confirmation and are fully transparent

⚠️ Note

This script is non-destructive – it only scans and reports. It does not automatically delete or quarantine any files. Always review flagged files before taking any action.


🎯 Why Use This?

  • Ideal for hosting providers and system admins
  • Perfect for VPS users looking for a quick, effective scan
  • Good first step after initial OS setup

🙌 Contribute or Report Issues

You can fork, improve, or report bugs directly on GitHub:

🔗 https://github.com/hosteons/linux-malware-scanner

🔐 Easily Change Your Windows RDP Port with a One-Click Script

One-Click Windows RDP Port Changer Script 🖥️

Managing a Windows VPS often requires securing RDP (Remote Desktop Protocol) access. One of the most effective and simplest ways to harden your Windows Server is to change the default RDP port (3389). But doing it manually via the registry and firewall can be tedious and risky.

That’s why we at Hosteons created an open-source, one-click PowerShell script that simplifies the process.

👉 GitHub RepoWindows RDP Port Changer Script


✅ Features

  • Changes RDP Port via Windows Registry
  • Updates Windows Firewall to allow the new port
  • Enables RDP if it’s currently disabled
  • Fully open-source and free under the MIT License
  • Supports Windows Server 2012/2016/2019/2022

📦 How to Use

  1. Login to your Windows VPS as Administrator.
  2. Open PowerShell.
  3. Run the script directly:
iwr -useb https://raw.githubusercontent.com/hosteons/Windows-RDP-Port-Changer-Script/main/rdp_port_changer.ps1 | iex
  1. Enter your desired RDP port when prompted.

⚠️ Important: Make sure your port is not blocked by external firewalls (such as cloud provider rules). Also, ensure you have console/VNC access in case the new port is misconfigured.


🤖 Automation Friendly

This script can be integrated into automation flows for server provisioning or batch management. Perfect for sysadmins managing multiple Windows VPS instances.


🔐 Why Change Your RDP Port?

  • Reduces brute-force attacks from bots scanning port 3389
  • Hides your RDP service from default port scanners
  • Adds an extra layer of obscurity in your defense

👨‍💻 Contribute or Report Issues

This is an open-source script. Feel free to fork, improve, or report issues on GitHub:

👉 https://github.com/hosteons/Windows-RDP-Port-Changer-Script


📣 About Hosteons

Hosteons is a VPS and dedicated server provider offering services in multiple global locations. We’re committed to open-source and providing useful automation tools for system administrators and developers.

🔐 Secure Your VPS Like a Pro: 6 Simple Firewall Rules That Block 90% of Attacks

Running a VPS gives you full control — but it also comes with responsibility. Whether you’re hosting with a budget VPS or a high-performance Ryzen VDS from Hosteons, security should always be a top priority.

Automated bots and malicious actors are constantly scanning servers looking for open doors. The good news? With just a few simple firewall rules, you can block 90% or more of common attacks — no advanced security knowledge needed.


🚧 Step 1: Deny All by Default

Your firewall should start from a “zero trust” position. Block all incoming traffic unless explicitly allowed.

iptables -P INPUT DROP
iptables -P FORWARD DROP
iptables -P OUTPUT ACCEPT

This is the safest starting point for VPS security.


✅ Step 2: Open Only the Ports You Need

For most users, these are the essential services:

iptables -A INPUT -p tcp --dport 22 -j ACCEPT   # SSH
iptables -A INPUT -p tcp --dport 80 -j ACCEPT   # HTTP
iptables -A INPUT -p tcp --dport 443 -j ACCEPT  # HTTPS

If you’re using a custom SSH port, be sure to update that here.


🛡️ Step 3: Rate-Limit SSH to Stop Brute-Force Attacks

SSH is the most frequently targeted service. Add a rate-limiting rule to block repeated login attempts:

iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --set
iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --update --seconds 60 --hitcount 3 -j DROP

This prevents bots from guessing passwords through brute force.


🧼 Step 4: Drop Invalid or Malicious Packets

Invalid packets are often used in scanning or attack attempts. Drop them:

iptables -A INPUT -m state --state INVALID -j DROP

This helps prevent certain types of kernel-level exploits and misbehavior.


🔁 Step 5: Allow Loopback and Established Connections

Let your server communicate with itself and continue existing sessions:

iptables -A INPUT -i lo -j ACCEPT
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT

Without these, things like internal services and return traffic might break.


👀 Step 6: (Optional) Block Ping (ICMP)

Ping isn’t harmful by itself, but attackers use it to detect live servers. You can hide yours:

iptables -A INPUT -p icmp --icmp-type echo-request -j DROP

Note: avoid this if you use ping-based monitoring tools.


💡 Bonus: Use CSF for Easier Firewall Management

Not comfortable with command-line tools? Hosteons VPS plans fully support CSF (ConfigServer Security & Firewall)— a beginner-friendly, feature-rich firewall system with:

  • Easy interface via DirectAdmin
  • Built-in brute-force detection
  • Country-level blocking
  • Port scan detection
  • Daily logs and alerts

Perfect for users who want simplicity without sacrificing power.


🔄 Don’t Forget to Save Your Rules

After setting your rules, make sure they persist after a reboot.

On Ubuntu/Debian:

iptables-save > /etc/iptables/rules.v4

On CentOS/RHEL:

Use iptables-save along with persistent packages, or configure firewalld.


🔐 VPS Security Starts with You

Whether you’re running a personal blog, game server, or production site on a VPS from Hosteons, implementing basic firewall rules should be your first line of defense.

These 6 rules are easy to set up and highly effective. For extra protection, consider:

  • Enabling fail2ban
  • Using SSH keys instead of passwords
  • Running regular security updates

At Hosteons, we offer high-performance, SSD-powered KVM VPS and Ryzen VDS backed by robust network security and full root access — so you’re always in control.

🔒 Ready to launch your secure VPS?

👉 Explore our VPS plans now

🔐 Why We Switched to Plausible Analytics and hCaptcha

A Faster, More Private Web Experience — Without Compromise

At HostEONS, we’re constantly working to make our website and services faster, more secure, and more privacy-respecting — for both our clients and visitors. That’s why we’ve recently made two major changes:

  • ✅ Switched from Google Analytics to Self-Hosted Plausible Analytics
  • ✅ Replaced Google reCAPTCHA with hCaptcha

Here’s why we made the switch — and what it means for you.


📊 From Google Analytics to Self-Hosted Plausible

❌ Why We Left Google Analytics Behind:

  • Heavy scripts that slow down page load times
  • Tracking cookies and IP logging
  • Not privacy-friendly for users (or compliant with global privacy trends)
  • Blocked by ad blockers and privacy tools
  • Sends data to Google — something many privacy-conscious users dislike

✅ Why We Chose Self-Hosted Plausible:

  • Lightweight & fast — the tracking script is ~1 KB
  • No cookies or personal data collected
  • We host it ourselves — full control, no external data transfer
  • Fully open-source and transparent
  • Minimal, useful stats (no bloated dashboards or invasive insights)

💡 By self-hosting Plausible, we maintain complete control over analytics data, while ensuring you’re not tracked or fingerprinted when visiting our site.


🤖 From reCAPTCHA to hCaptcha

❌ Why We Moved Away from Google reCAPTCHA:

  • Slower to load
  • Annoying CAPTCHA challenges (find the traffic light, anyone?)
  • Tracks users via cookies and behavior analysis
  • Relies on Google’s infrastructure and ecosystem
  • Sometimes blocked in certain regions (e.g., China)

✅ Why hCaptcha Is Better:

  • Privacy-focused bot protection
  • Does not track users or store data unnecessarily
  • More region-friendly — works in places where Google is restricted
  • Drop-in compatible with reCAPTCHA — so the transition was seamless
  • Earns micro-rewards for solving CAPTCHAs (helpful for open web projects)

🚀 hCaptcha allows us to stop bots and abuse without tracking our visitors or relying on big-tech gatekeepers.


🧭 Reflecting Our Core Values

These changes aren’t just technical decisions. They align with what we stand for:

  • Speed and efficiency
  • Privacy by default
  • Self-reliance and open standards
  • Respect for user trust

Whether you’re visiting our homepage, reading the blog, or logging into the client area, you’ll now enjoy a cleaner, faster, more ethical experience.


✅ Summary

Tool ReplacedNew ToolWhy It’s Better
Google AnalyticsSelf-hosted PlausibleLightweight, privacy-first, self-owned
Google reCAPTCHAhCaptchaFaster, cookie-free, works globally

We believe hosting providers should care about more than just servers. Every element of our infrastructure — even the frontend — should reflect the same values of transparency, reliability, and respect for our users.

Thank you for choosing HostEONS.

🔗 Explore Hosting Plans

📩 Contact Support

Why You Should Use a Private VPN on Your Own VPS While Traveling

When you’re traveling — whether for work, study, or leisure — using public Wi-Fi networks is often unavoidable. Airports, hotels, cafes, and coworking spaces all offer connectivity, but often at the cost of privacy and security.

While many people turn to commercial VPNs to protect their connection, the best and most secure option is to run your own private VPN on a VPS.

In this post, we’ll explain why that matters and how you can get started using a VPS from Hosteons.


🔐 Why Privacy Matters More When You Travel

When you use public networks, your data is at risk from:

  • 🕵️‍♂️ Network sniffing and man-in-the-middle attacks
  • ❗ Fake Wi-Fi hotspots
  • 👁️ ISP or network logging and censorship
  • 🚫 Location-based content restrictions

VPNs solve this by encrypting your traffic and routing it through a trusted server — but who controls that server matters a lot.


🤔 The Problem with Public/Commercial VPNs

While commercial VPNs are better than nothing, they come with some caveats:

  • ❌ Shared IPs — may be flagged, banned, or blacklisted
  • ❌ Limited trust — you’re trusting a third-party company with your traffic
  • ❌ Logs and data retention — not all “no-log” policies are actually enforced
  • ❌ Performance throttling — many commercial VPNs limit speeds or locations
  • ❌ Overcrowded servers — inconsistent speeds and high latency

In short, you’re still handing over your traffic to someone else.


✅ Why a Private VPN on Your VPS is Better

Setting up a VPN on your own VPS solves most of these issues — and gives you full control.

✨ Benefits of Running a VPN on Your Own VPS:

  1. Full Control
    • You own and configure the server — no third-party snooping.
  2. Dedicated IP Address
    • No one else shares your IP, reducing chances of blacklisting or captchas.
  3. Custom Configuration
    • Choose your encryption, protocol (WireGuard, OpenVPN, etc.), DNS, and firewall rules.
  4. Faster Speeds
    • Avoid the bandwidth bottlenecks common with commercial VPNs.
  5. Consistent Access While Abroad
    • Appear to be at “home” and access region-specific services like banking or Netflix.
  6. Bypass Local Censorship or Firewalls
    • Secure access even in restrictive countries.
  7. Affordable
    • VPS plans from Hosteons start at just $1.75/month — often cheaper than VPN subscriptions.

🌐 Recommended VPN Protocols

You can install and run any of the following on your Hosteons VPS:

  • WireGuard – Lightweight, fast, and secure. Great for mobile.
  • OpenVPN – Highly configurable and widely supported.
  • Shadowsocks / V2Ray – Ideal for bypassing censorship in restricted regions.
  • IPSec / L2TP – Good compatibility with built-in OS VPN support.

Need help? Check out our tutorials for in our knowledge based articles for various types of VPN and Proxy on Hosteons.


🧭 VPS Locations for Best Travel VPN Experience

Choose your VPS location based on:

  • Your home country (to access region-locked services)
  • neutral/nearby country for lower latency
  • High-bandwidth regions (like Germany, or Los Angeles)

Hosteons offers VPS in multiple locations globally, with inbound unmetered bandwidth and IPv6 support.


🔐 Bonus Tip: Add Your Own DNS & Firewall Rules

Once you’ve set up your private VPN:

  • Use custom DNS servers like NextDNS or AdGuard
  • Set firewall rules to block tracking domains or limit open ports
  • Enable kill switches on mobile and desktop to avoid leaks

🧰 What You’ll Need to Get Started

  • Hosteons VPS (1 CPU, 512MB+ RAM is enough for VPN)
  • A domain (optional, for easier connection)
  • Basic Linux knowledge or follow one of our setup scripts
  • Your laptop or mobile devices

🚀 Ready to Travel Securely?

Don’t rely on sketchy free VPNs or overcrowded commercial services. Take control of your online privacy and performance with a self-hosted VPN on your own VPS.

🔗 Explore Hosteons VPS plans starting at just $1.75/month:

👉 https://hosteons.com

Need help setting it up? We’re always here → https://my.hosteons.com

What Is Freegate and How to Set It Up

In regions with internet censorship and restrictions, accessing free and open content on the web can be challenging. That’s where tools like Freegate come in.

If you’re new to Freegate or want to help others get started, this guide will explain what it is, how it works, and how to install and use it safely.


🔍 What Is Freegate?

Freegate is a free anti-censorship software developed by Dynamic Internet Technology (DIT), primarily used in China, Iran, and other countries with restricted internet access. It allows users to bypass the Great Firewall (GFW) and access blocked websites, including Google, YouTube, and many news platforms.

Freegate uses DynaWeb proxy servers (a system of encrypted tunnels) to provide users with secure and private access to the open internet.


🛡️ Key Features of Freegate

  • 💻 No installation required (portable EXE file)
  • 🔐 Encrypted tunneling through DynaWeb
  • 🌐 Supports both IE and Chrome/Firefox via proxy
  • ✅ No configuration needed — just run and connect
  • 💸 Completely free to use

📥 How to Download Freegate

  1. Visit a reliable mirror (Freegate’s website is often blocked in restricted regions):
  2. Download the latest version (usually a .zip file containing fg742p.exe or similar).
  3. Extract the file to a folder (no need to install).

🖥️ How to Use Freegate

  1. Run fgXXXp.exe (replace XXX with version number).
    • No installation needed; it runs as a standalone app.
  2. When prompted, choose your preferred mode:
    • Classic Mode (default) opens Internet Explorer with proxy enabled
    • Proxy Mode lets you configure external browsers like Chrome or Firefox
  3. Once connected, Freegate will display the DynaWeb homepage, confirming that your connection is active.

🌐 How to Use Freegate with Chrome or Firefox

If you prefer using Chrome or Firefox:

  1. Launch Freegate
  2. Go to your browser settings
  3. Set the HTTP proxy to:
    • 127.0.0.1
    • Port: 8580 (default used by Freegate)
  4. Save the settings and browse as usual — Freegate will tunnel traffic through DynaWeb.

📱 Can You Use Freegate on Mobile?

Unfortunately, Freegate is only available for Windows desktop environments. For mobile use, consider using:

  • VPN apps (WireGuard/OpenVPN + Hosteons VPS)
  • V2Ray or Shadowsocks with Android/iOS clients
  • Tor Browser (mobile)

⚠️ Important Notes

  • Freegate may not work reliably if deep packet inspection (DPI) is active on your network.
  • Because it uses a central set of proxy servers, Freegate performance may fluctuate depending on demand and censorship levels.
  • If you’re seeking a more stable and private option, consider running your own proxy server or VPN on a VPS (like one from Hosteons).

🚀 Want More Control? Use a VPS Instead

Freegate is great for beginners, but if you want more flexibility and privacy, consider deploying:

  • Shadowsocks or V2Ray on a Hosteons VPS
  • WireGuard VPN for all devices
  • Self-hosted proxies with IPv6 vHosts and custom rDNS

Hosteons offers:

  • ✅ Full root access
  • ✅ Global server locations
  • ✅ Inbound unmetered bandwidth
  • ✅ Up to 20 IPv6 IPs per VPS
  • ✅ Crypto & local payment options

🔗 Final Thoughts

Freegate is a powerful tool for quickly bypassing censorship and accessing open internet content. It’s ideal for casual users in restrictive environments — but power users will benefit from setting up their own VPS-based proxy for maximum control.

🧠 Want to go further? Check out our guides on:


Need a VPS to run your own private proxy?

👉 https://hosteons.com – starting at just $1.75/month