I would suggest that you take the opportunity to learn more about hardening a linux server, this is a great use case for the Pi. Will you browse the web on it? If so will you use it to access password protected websites? or your bank? will you buy anything with a credit card? will you store things that could be embarrassing if others saw them (that selfie from the holiday party)? Are there others sharing the network who can spread malware/viruses and attacks by their unsafe behaviour otr compromised PC? Let me address one of the underlying assumptions: You say "although I don't really have very sensitive data on it." You may have far more data at risk than you first think. Again remember the rule is to protect things in depth.Htpasswd will do nothing to protect your ssh connection, or other services you may expose (mysql). htpasswd protection in front of phpmyadmin and any sensitive web directories (like admin directories for wordpress and the like, Is it enough alone, no. BTW the second rule of security is that there is no perfectly secure system. Keep in mind the first rule of security is defense in depth (and that mac/ip addresses can be spoofed). Additionally, we will answer some of the most common questions related.
How to whitelist a website on mac how to#
If you are going to access this from outside your local network then I would add SSH tunneling or a VPN (in addition to the firewall), both of which may require configuring your router to forward the required ports. In this guide, we will explain how to add trusted sites in Google Chrome on Windows, Mac, Android, iPhone, and with GPO. If you are only accessing the Pi from your local network and are behind a cable or DSL modem that does NAT a host based firewall may be enough (check out uncomplicated firewall - a simple interface for iptables). while a blacklist of known malware and attack sites can be put together by a vendor for widespread use. This page should get you started in the right direction - this is not a foolproof method of securing a box since the mac address can be spoofed. What you want to do is called mac address filtering.