Remove 2016 Remove Firewall Remove Linux Remove Security
article thumbnail

DockerCon 2016 Vendor Meetings

Scott Lowe

While at DockerCon 2016 in Seattle today, I took some time on the expo floor to talk to a number of different vendors, mostly focused on networking solutions. Using eBPF, Plumgrid has created in-kernel virtual network functions (VNFs) that do things like bridging, routing, network address translation (NAT), and firewalling.

Meeting 60
article thumbnail

Technology Short Take #77

Scott Lowe

In a bit of an older post from late summer 2016, Matt Oswalt outlines why network engineers should care about the network software supply chain. Jeff Geerling has a great article on why he returned his 2016 MacBook Pro with Touch Bar ; it’s definitely worth a read, in my opinion.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #63

Scott Lowe

At DevOps Networking Forum 2016, I had the opportunity to share a presentation on some Linux networking options. Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. You may also find this (related) article on memory inside Linux containers to be helpful.

Vmware 60
article thumbnail

5 Reasons Why Ansible is the Best CM Tool Out There?

Cloud Musings

And CFEngine, which provide automation for infrastructure, cloud, compliance and security management, integration for deployment and continuous deployment (CI / CD). It effortlessly integrates with any area of the IT infrastructure, be it provisioning virtual machines (VMs) or creating firewall rules.

Tools 94
article thumbnail

Technology Short Take #66

Scott Lowe

I recently spoke at Interop 2016 in Las Vegas, and while I was there I scribbled down some notes pertaining to how decomposing applications into microservices-based architectures was similar in some respects to decomposing networks into an overlay network and an underlay (physical) network. Networking. Servers/Hardware. Maybe next time?

Vmware 60
article thumbnail

Technology Short Take #57

Scott Lowe

We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy. This article provides a good introductory overview of Linux iptables commands for configuring host-based firewall rules on your Linux systems.

Windows 60
article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

Years ago, I was the lead security software reviewer at ZDNet and then at CNET. That meant I tested the release candidates -- not the final product you’d buy in the stores - for consumer-grade antivirus programs, desktop firewalls, and desktop Intrusion detection systems. And I was able to repeat the process over and over.