Remove Apple Remove Firewall Remove Linux Remove Operating Systems
article thumbnail

Technology Short Take 136

Scott Lowe

This article by Joshua Fox outlines how and when to use each of the various types of firewalls offered by AWS. Operating Systems/Applications. Ryan Blunden has authored a fairly comprehensive piece on environment variables in Linux and macOS. Linux may be coming to the Apple M1 chip.

Linux 60
article thumbnail

Technology Short Take #77

Scott Lowe

There was a fair amount of wailing and gnashing of teeth when Apple updated the MacBook Pro line with the Touch Bar. Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Operating Systems/Applications. Some people love it, others absolutely hate it.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #63

Scott Lowe

At DevOps Networking Forum 2016, I had the opportunity to share a presentation on some Linux networking options. Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. Operating Systems/Applications. Have fun reading! Networking. Servers/Hardware.

Vmware 60
article thumbnail

Technology Short Take #68

Scott Lowe

In the event you accidentally locked yourself out of vCenter using NSX’s distributed firewall, this post by Roie Ben Haim provides a workaround for getting yourself out of this pickle. Operating Systems/Applications. This is a highly technical article on scheduling in the Linux kernel , but it’s well worth reading.

Linux 60
article thumbnail

Technology Short Take 132

Scott Lowe

” Ivan Pepelnjak attempts to answer the question, “How much do I need to know about Linux networking?” ” Speaking of Linux networking…Marek Majkowski of Cloudflare digs deep into conntrack , used for stateful firewalling functionality. Operating Systems/Applications. Servers/Hardware.

article thumbnail

Technology Short Take 139

Scott Lowe

In this post , Jakub Sitnicki digs way deep into the Linux kernel to uncover the answer to the question, “Why are there no entries in the conntrack table for SYN packets dropped by the firewall?” Linux malware is getting more sophisticated. Operating Systems/Applications. ” Get ready to get nerdy!

Vmware 60
article thumbnail

Technology Short Take #57

Scott Lowe

We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy. This article provides a good introductory overview of Linux iptables commands for configuring host-based firewall rules on your Linux systems. on an Apple Xserve 3,1.

Windows 60