Remove Blog Remove Firewall Remove Linux Remove Network
article thumbnail

Azure Storage Account Networking: When to Use Firewalls and Service Endpoints

Linux Academy

Recently, when building content for one of my upcoming courses, Microsoft Azure Architect Technologies – Exam AZ-300 , I found the Microsoft documentation wasn’t immediately clear on the exclusivity of Storage Account Firewalls, and Service Endpoints. Do I need to use Service Endpoints and the Storage Firewall together?

article thumbnail

Top 5 Tips to Improve Your Linux Desktop Security 2017

Galido

Having Linux as your operating system is one of the better decisions you can make concerning your computer’s security. However, many Linux users make the same mistakes of believing that it’s enough just to have it on your computer and only that fact will make all threats simply disappear, when unfortunately the reality is quite different.

Linux 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Product Review: Paessler PRTG Network Monitor

Galido

Information Technology Blog - - Product Review: Paessler PRTG Network Monitor - Information Technology Blog. PRTG Network Monitor from Paessler AG is a powerful network monitoring solution. This network software is not only powerful but also easy to use. Problems in the network cause emergencies in business.

Network 60
article thumbnail

Using WireGuard on macOS

Scott Lowe

In that post, I focused on the use of Linux on both the server side (on an EC2 instance in your AWS VPC) as well as on the client side (using the GNOME Network Manager interface). If the peer is Linux-based, you can use the information in my earlier blog post ; if the peer is macOS, then use the instructions in this post.

Linux 78
article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

We use templates for network devices, workstations, laptops, and servers so that all of our devices match our security templates. Network Device Configurations. For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. How do we do this kind of monitoring?

article thumbnail

Learn Google Cloud by Doing with New Google Cloud Training!

Linux Academy

From new courses to new labs, we have a ton of exciting new Google Cloud updates at Linux Academy ( where you can get the most Google Cloud training on this planet! ). Practice what you’re learning by spinning up live environments within Linux Academy! Creating Firewall Rules on a Google Cloud VPC Network.

article thumbnail

Learn AWS by Doing with New AWS Hands-On Training!

Linux Academy

With engaging features like live AWS cloud sandboxes and servers, Interactive Diagrams, Hands-On Labs in live cloud environments, customizable flashcards, study groups, direct access to our expert Training Architects, downloadable Course videos, and more, Linux Academy is the #1 cloud training platform that helps you learn AWS by doing.