Remove Apple Remove Firewall Remove Hardware Remove Open Source
article thumbnail

Technology Short Take 136

Scott Lowe

This article by Joshua Fox outlines how and when to use each of the various types of firewalls offered by AWS. Servers/Hardware. The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Linux may be coming to the Apple M1 chip. Compute safely.

Linux 60
article thumbnail

Technology Short Take #63

Scott Lowe

Matt Oswalt recently unveiled (and open sourced) a framework called ToDD, which stands for “Testing on Demand: Distributed”. Servers/Hardware. Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. Read more about it here. VMware recently GA’d version 6.2

Vmware 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 132

Scott Lowe

I think a fair number of folks may not be aware that the Nginx ingress controller for Kubernetes—both the community version and the Nginx-maintained open source version—do suffer from timeouts and errors resulting from changes in the back-end application’s list of endpoints (think pods being added or removed).

article thumbnail

Technology Short Take 145

Scott Lowe

Well, let’s see…stuff on Envoy, network automation, network designs, M1 chips (and potential open source variants!), Ivan Pepelnjak shares some links and thoughts on configuring the NSX-T firewall with a CI/CD pipeline built on GitHub Actions and Terraform Cloud. Servers/Hardware. Networking.

article thumbnail

Technology Short Take 145

Scott Lowe

Well, let’s see…stuff on Envoy, network automation, network designs, M1 chips (and potential open source variants!), Ivan Pepelnjak shares some links and thoughts on configuring the NSX-T firewall with a CI/CD pipeline built on GitHub Actions and Terraform Cloud. Servers/Hardware. Networking.

article thumbnail

Technology Short Take #57

Scott Lowe

Servers/Hardware. We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy. This article provides a good introductory overview of Linux iptables commands for configuring host-based firewall rules on your Linux systems. on an Apple Xserve 3,1.

Windows 60
article thumbnail

Managing What Matters In the Cloud: The Apps » Data Center.

Data Center Knowledge

The latter can be open-source software such as OpenStack, CloudStack or commercial products such as Citrix CloudPlatform or VMware Cloud Director (VCD). The user level elements that are managed within such an IaaS cloud are virtual servers, cloud storage and shared resources such as load balancers and firewalls. Firewall rules.