Remove Definition Remove Firewall Remove Linux Remove Operating Systems
article thumbnail

Top 5 Tips to Improve Your Linux Desktop Security 2017

Galido

Having Linux as your operating system is one of the better decisions you can make concerning your computer’s security. Having this OS on your desktop allows you to relax a little bit when it comes to many forms of security breaches, which would probably inflict serious damage to less security-oriented systems.

Linux 66
article thumbnail

Technology Short Take #77

Scott Lowe

Jeff Geerling has a great article on why he returned his 2016 MacBook Pro with Touch Bar ; it’s definitely worth a read, in my opinion. Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Operating Systems/Applications.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #49

Scott Lowe

I highly recommend you read the entire post, but in short the five skills Matt recommends are software skills (which includes configuration management and software development tools like Git ), Linux, deep protocol knowledge, hypervisor and container networking, and IPv6. Operating Systems/Applications. What does this mean?

Vmware 60
article thumbnail

Technology Short Take #70

Scott Lowe

I saw two articles talking about his experience: one on redirecting NSX firewall logs into SmartLog and a second one ranting on how the NSX DFW isn’t quite enterprise ready. Operating Systems/Applications. Marco van Baggum describes his experience in working with NSX 6.2.3 and Trend Micro’s Deep Security in this article.

Vmware 60
article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

That meant I tested the release candidates -- not the final product you’d buy in the stores - for consumer-grade antivirus programs, desktop firewalls, and desktop Intrusion detection systems. Vamosi: So a vulnerable version of Bash provided an attacker the ability to pass untrusted code to other systems and processes.

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

That meant I tested the release candidates -- not the final product you’d buy in the stores - for consumer-grade antivirus programs, desktop firewalls, and desktop Intrusion detection systems. Vamosi: So a vulnerable version of Bash provided an attacker the ability to pass untrusted code to other systems and processes.

article thumbnail

Technology Short Take #57

Scott Lowe

In part 2 Larry walks through the node definitions in Vagrant , and in part 3 he reviews the Vagrantfile and turns up the environment. We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy. Operating Systems/Applications.