Remove Firewall Remove Hardware Remove Linux
article thumbnail

Technology Short Take 182

Scott Lowe

Servers/Hardware I thought this write-up of Andy Bechtolsheim’s keynote at Hot Interconnects 2024 was an interesting summary of where we could see hardware development go in the next 4 years. Gabriella Gonzalez shares some tricks for jailbreaking hosts behind “secure” enterprise firewalls.

Linux 60
article thumbnail

Technology Short Take 136

Scott Lowe

This article by Joshua Fox outlines how and when to use each of the various types of firewalls offered by AWS. Servers/Hardware. Ryan Blunden has authored a fairly comprehensive piece on environment variables in Linux and macOS. Linux may be coming to the Apple M1 chip. Thinking of buying an M1-powered Mac?

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 132

Scott Lowe

” Ivan Pepelnjak attempts to answer the question, “How much do I need to know about Linux networking?” ” Speaking of Linux networking…Marek Majkowski of Cloudflare digs deep into conntrack , used for stateful firewalling functionality. Servers/Hardware.

article thumbnail

Technology Short Take 139

Scott Lowe

In this post , Jakub Sitnicki digs way deep into the Linux kernel to uncover the answer to the question, “Why are there no entries in the conntrack table for SYN packets dropped by the firewall?” Servers/Hardware. Linux malware is getting more sophisticated. ” Get ready to get nerdy! Aye aye, Popeye!

Vmware 60
article thumbnail

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

As many of you know, most firewalls today come with a default rule set permitting all outbound traffic to flow freely. You put the firewall in place, and traffic flows outbound unimpeded. This year number five is is Secure configurations for hardware and software on devices , and number 11 is Secure configuration for network devices.

article thumbnail

Technology Short Take #33

Scott Lowe

This post by Ranga Maddipudi shows you how to use App Firewall in conjunction with VXLAN logical networks. Next, Jason dives a bit deeper on the relationship between network overlays and hardware , and shares his thoughts on where it does—and doesn’t—make sense to have hardware terminating overlay tunnels.

HP 113
article thumbnail

COMS002: Next Generation Cloud Infrastructure with Data Plane Virtualization

Scott Lowe

Verplanke believes that DPDK (Data Plane Development Kit) and virtualization are key to virtualizing workloads that move around lots and lots of packets, such as firewalls, routers, and other similar functions. Devices first started as tightly-coupled hardware and software solutions. Is the Linux bridge efficient enough?