Remove Firewall Remove How To Remove Linux Remove Software
article thumbnail

Top 5 Tips to Improve Your Linux Desktop Security 2017

Galido

Having Linux as your operating system is one of the better decisions you can make concerning your computer’s security. However, many Linux users make the same mistakes of believing that it’s enough just to have it on your computer and only that fact will make all threats simply disappear, when unfortunately the reality is quite different.

Linux 66
article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

Ansible can help automate the backup, and you can learn more in this month’s how-to video that covers using Ansible to back up a Cisco ASA firewall. We can also use some other IT-centric software packages, like Spiceworks , a free helpdesk ticketing system with some monitoring capabilities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud Playground for Beginners: Navigating your first Server

Linux Academy

Welcome to Linux Academy’s Cloud Playground! Used basic Linux commands on that server. The great thing about this in-browser terminal is that it bypasses restrictions that corporate firewalls typically have, so you can learn on the job without restriction. By the end of this guide, you will have: Started an Ubuntu server.

Cloud 74
article thumbnail

Microsegmentation – Secure Your Internal Network

CTOvision

The problem is that threat actors are able to get through the castle gates (firewalls) and once in, are able to evade the castle guards (IPS). Microsegmentation brings three important things to the table: 1) support for network virtualization; 2) support for software defined networking; and 3) automation. Microsegmentation for Dummies.

Network 150
article thumbnail

Technology Short Take #77

Scott Lowe

Yes, the article is slightly OpenStack-centric, but it still remains a very informative look at the different components of OVN and how OVN works. You might also be interested in an earlier article that outlines how to build and install OVN with OpenStack.). Eddie Cranklin Kim shares how to create a virus using assembly language. (I’m

Linux 60
article thumbnail

Technology Short Take #49

Scott Lowe

I highly recommend you read the entire post, but in short the five skills Matt recommends are software skills (which includes configuration management and software development tools like Git ), Linux, deep protocol knowledge, hypervisor and container networking, and IPv6. What does this mean? You’re welcome.

Vmware 60
article thumbnail

Technology Short Take #63

Scott Lowe

At DevOps Networking Forum 2016, I had the opportunity to share a presentation on some Linux networking options. At the recent OCP Summit, Microsoft introduced Software for Open Networking in the Cloud (SONiC). Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall.

Vmware 60