urbanists.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a server for people who like bikes, transit, and walkable cities. Let's get to know each other!

Server stats:

553
active users

#firewall

6 posts6 participants1 post today
iX Magazin<p>iX-Workshop: Sicherer Betrieb von Windows 11 in Unternehmen</p><p>Lernen Sie an praktischen Beispielen, wie Sie Windows 11 Pro und Enterprise in Ihrem Unternehmen sicher und effektiv einsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Sicherer-Betrieb-von-Windows-11-in-Unternehmen-10353991.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Sich</span><span class="invisible">erer-Betrieb-von-Windows-11-in-Unternehmen-10353991.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
r1w1s1Comparing firewall syntax for SSH (port 22) with default-deny:<br>================================================<br><br><a href="https://snac.bsd.cafe?t=iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#iptables</a> (Linux)<br>iptables -A INPUT -p tcp --dport 22 -j ACCEPT<br>iptables -P INPUT DROP<br><br><a href="https://snac.bsd.cafe?t=nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#nftables</a> (Linux)<br>nft add rule inet my_filter input tcp dport 22 accept<br>nft add rule inet my_filter input drop<br><br><a href="https://snac.bsd.cafe?t=ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#ufw</a> (Linux - simplified frontend to iptables)<br>ufw allow 22/tcp<br>ufw default deny incoming<br><br><a href="https://snac.bsd.cafe?t=pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#pf</a> (OpenBSD)<br>pass in proto tcp to port 22<br>block all<br><br>pf’s syntax feels so elegant, human-readable, &amp; minimal!<br><br>After 20years scripting iptables, I’m ready to try UFW on my laptop.<br><a href="https://snac.bsd.cafe?t=firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#firewall</a> <a href="https://snac.bsd.cafe?t=sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#sysadmin</a> <a href="https://snac.bsd.cafe?t=pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#pf</a> <a href="https://snac.bsd.cafe?t=iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#iptables</a> <a href="https://snac.bsd.cafe?t=ufw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#ufw</a> <a href="https://snac.bsd.cafe?t=nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#nftables</a><br>
DER SPIEGEL | inoffiziellAuf X kann man nachlesen, wie Elon Musk in den vergangenen Jahren nach rechts driftete. Mit jedem Post wird er lauter und extremer. Hören Sie, welche Rolle Corona und ein Coming-out dabei spielen.<a href="https://anonsys.net/search?tag=Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://anonsys.net/search?tag=ElonMusk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElonMusk</span></a> <a href="https://anonsys.net/search?tag=XTwitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XTwitter</span></a> <a href="https://anonsys.net/search?tag=Coronavirus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Coronavirus</span></a> <a href="https://anonsys.net/search?tag=Unternehmen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Unternehmen</span></a><br><a href="https://www.spiegel.de/wirtschaft/unternehmen/elon-musk-radikalisierung-durch-corona-und-twitter-podcast-firewall-a-822944c9-bc10-4474-b8b8-71a7a8f8b6c5#ref=rss" rel="nofollow noopener noreferrer" target="_blank">Der unglaubliche Aufstieg des Techmilliardärs: Was Elon Musk radikalisiert hat</a>
DeadSwitch @ T0m's 1T C4fe<p>Automating UFW Configuration with Ansible: Locking Down the Digital Fortress <a href="https://mastodon.social/tags/Ansible" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ansible</span></a> <a href="https://mastodon.social/tags/UFW" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UFW</span></a> <a href="https://mastodon.social/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://mastodon.social/tags/Automation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Automation</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/ServerSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ServerSecurity</span></a> <a href="https://mastodon.social/tags/DeadSwitch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeadSwitch</span></a> <a href="https://mastodon.social/tags/OperationalSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationalSecurity</span></a> <a href="https://mastodon.social/tags/AnsiblePlaybook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AnsiblePlaybook</span></a> <a href="https://mastodon.social/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://mastodon.social/tags/AutomationTools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AutomationTools</span></a> <a href="https://mastodon.social/tags/AnsibleRoles" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AnsibleRoles</span></a> <a href="https://mastodon.social/tags/SystemAdministration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SystemAdministration</span></a> <a href="https://mastodon.social/tags/SecureServer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureServer</span></a> <a href="https://mastodon.social/tags/Encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Encryption</span></a> <a href="https://mastodon.social/tags/AnsibleVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AnsibleVault</span></a> <a href="https://mastodon.social/tags/PrivacyTools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyTools</span></a> <a href="https://mastodon.social/tags/SecurityAutomation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAutomation</span></a></p><p><a href="http://tomsitcafe.com/2025/04/16/automating-ufw-configuration-with-ansible-locking-down-the-digital-fortress/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="ellipsis">tomsitcafe.com/2025/04/16/auto</span><span class="invisible">mating-ufw-configuration-with-ansible-locking-down-the-digital-fortress/</span></a></p>
politikal<p>Wie bringt man die Mitmenschen nur dazu, den Mailverkehr zu verschlüsseln? Stöhn... 😵‍💫</p><p><a href="https://mastodon.social/tags/unplugtrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unplugtrump</span></a> <a href="https://mastodon.social/tags/pfsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pfsense</span></a> <a href="https://mastodon.social/tags/opnsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opnsense</span></a> <a href="https://mastodon.social/tags/netcup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netcup</span></a> <a href="https://mastodon.social/tags/vps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vps</span></a> <a href="https://mastodon.social/tags/cloudserver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudserver</span></a> <a href="https://mastodon.social/tags/netzwerk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netzwerk</span></a> <a href="https://mastodon.social/tags/cloudnetzwerk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudnetzwerk</span></a> <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>server</span></a> <a href="https://mastodon.social/tags/lineageOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lineageOS</span></a> <a href="https://mastodon.social/tags/DigitaleSouver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitaleSouveränität</span></a> <a href="https://mastodon.social/tags/SupportYourLocalDealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SupportYourLocalDealer</span></a> <a href="https://mastodon.social/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/linuxmint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxmint</span></a> <a href="https://mastodon.social/tags/digitaleSouver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitaleSouveränität</span></a> <a href="https://mastodon.social/tags/digitaleSicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitaleSicherheit</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsecurity</span></a></p>
Impish4249<p><span class="h-card" translate="no"><a href="https://cyberplace.social/@GossiTheDog" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GossiTheDog</span></a></span> </p><p>Rough time to have DOGE running around cutting staff in US Government in seemingly random ways...</p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/FortinetFirewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FortinetFirewall</span></a> <a href="https://mastodon.social/tags/Fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortinet</span></a> <a href="https://mastodon.social/tags/threatactors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatactors</span></a></p>
heise online English<p>Palo Alto Networks: Vulnerabilities in PAN-OS jeopardize firewalls</p><p>Vulnerabilities in the PAN-OS firewall operating system threaten networks. Security updates are available for download. </p><p><a href="https://www.heise.de/en/news/Palo-Alto-Networks-Vulnerabilities-in-PAN-OS-jeopardize-firewalls-10348582.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Palo-Alto-Net</span><span class="invisible">works-Vulnerabilities-in-PAN-OS-jeopardize-firewalls-10348582.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise Security<p>Palo Alto Networks: Schwachstellen in PAN-OS gefährden Firewalls</p><p>Sicherheitslücken im Firewall-Betriebssystem PAN-OS bedrohen Netzwerke. Sicherheitsupdates stehen zum Download. </p><p><a href="https://www.heise.de/news/Palo-Alto-Networks-Schwachstellen-in-PAN-OS-gefaehrden-Firewalls-10348442.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Palo-Alto-Networ</span><span class="invisible">ks-Schwachstellen-in-PAN-OS-gefaehrden-Firewalls-10348442.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@micahflee" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>micahflee</span></a></span> lemme guess: <span class="h-card" translate="no"><a href="https://mastodon.social/@eff" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>eff</span></a></span> just took a multi-network eSIM and multi-network WWAN modules to scan for "<a href="https://infosec.space/tags/deauth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deauth</span></a>" / "<a href="https://infosec.space/tags/EvilTwin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EvilTwin</span></a>" attacks?</p><p>Cuz I remember <span class="h-card" translate="no"><a href="https://social.heise.de/@heiseonline" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>heiseonline</span></a></span> or <span class="h-card" translate="no"><a href="https://squeet.me/profile/golem" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>golem</span></a></span> actually suggest this as a method to detect <a href="https://infosec.space/tags/IMSIcatchers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IMSIcatchers</span></a> without requiring an expensive <a href="https://infosec.space/tags/SDR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SDR</span></a>: </p><ul><li>By precisely looking when which WWAN stick (for <a href="https://infosec.space/tags/3G" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>3G</span></a> back then) got disconnected and warning if they all got disconnected &amp; reconnected at the same time...</li></ul><p>AFAIK <a href="https://infosec.space/tags/GSMK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GSMK</span></a> uses that same technique for their <a href="https://infosec.space/tags/Baseband" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Baseband</span></a>-<a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> to automatically detect <a href="https://infosec.space/tags/Interception" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Interception</span></a> attempts and deploy countermeasures!</p>
Doerk<p>Gary has published a new video on his 5 top tips for home labbers, focusing on pfSense/opnsense. Like always, good tips for those of us who are using these filters in their network. Thanks <span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@garyhtech" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>garyhtech</span></a></span> !</p><p><a href="https://mastodon.bsd.cafe/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.bsd.cafe/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.bsd.cafe/tags/bsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bsd</span></a> <a href="https://mastodon.bsd.cafe/tags/pfsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pfsense</span></a></p><p><a href="https://m.youtube.com/watch?v=HR9SnkrbVnI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">m.youtube.com/watch?v=HR9Snkrb</span><span class="invisible">VnI</span></a></p>
GNU/Linux.ch<p>Video: Portmaster - die perfekte Desktop-Firewall</p><p>Schütze deinen Linux-Desktop mit der Applikations-Firewall Portmaster. Du kannst den Zugriff im Detail und pro Anwendung einschränken, sodass wirklich nur noch die Apps ins Internet kommen, die es auch sollen. Mithilfe von Filterlisten wird zusätzlich lästige Werbung ausgeblendet und du bist wirklich sicher im Netz unterwegs. </p><p><a href="https://social.anoxinon.de/tags/Portmaster" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Portmaster</span></a> <a href="https://social.anoxinon.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.anoxinon.de/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://social.anoxinon.de/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a></p><p><a href="https://gnulinux.ch/portmaster-die-perfekte-desktop-firewall" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gnulinux.ch/portmaster-die-per</span><span class="invisible">fekte-desktop-firewall</span></a></p>
Linux Renaissance<p><strong>Linux Renaissance - Channel Update - April 2025</strong></p> <p><a href="https://video.fosshq.org/w/im27x4NwrCiwJXQ4doihzs" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">video.fosshq.org/w/im27x4NwrCi</span><span class="invisible">wJXQ4doihzs</span></a></p>
D_70WN 🌈 🏳️‍⚧️<p>- OPNSense from the Netherlands<br>- <a href="https://opnsense.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">opnsense.org/</span><span class="invisible"></span></a></p><p>- OpenWrt International<br>- <a href="https://openwrt.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">openwrt.org/</span><span class="invisible"></span></a></p><p>Many of them also offer hardware and if no hardware is offered or you want something of your own then you will find everything you need here, <a href="https://www.nrg-systems.de/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">nrg-systems.de/</span><span class="invisible"></span></a></p><p><a href="https://chaos.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://chaos.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://chaos.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsecurity</span></a> <a href="https://chaos.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> </p><p>2/2</p><p>/EOL</p>
D_70WN 🌈 🏳️‍⚧️<p>For good reasons, I have completely switched from US providers to EU FOSS projects and solutions since around 2020. Here are the router/firewall solutions. 1/2</p><p>- DD-WRT from Germany<br>- <a href="https://dd-wrt.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">dd-wrt.com/</span><span class="invisible"></span></a></p><p>- DynFI from France<br>- <a href="https://dynfi.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">dynfi.com/</span><span class="invisible"></span></a> </p><p> - IPFire from Germany<br>- <a href="https://www.ipfire.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">ipfire.org/</span><span class="invisible"></span></a></p><p>- Mikrotik from Latvia<br>- <a href="https://mikrotik.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">mikrotik.com/</span><span class="invisible"></span></a></p><p>- Nethsecurity from Italy<br>- <a href="https://nethsecurity.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nethsecurity.org/</span><span class="invisible"></span></a></p><p><a href="https://chaos.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://chaos.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a> <a href="https://chaos.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsecurity</span></a> <a href="https://chaos.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Βασίλης Βαλατσός<p>The best way to stop <a href="https://social.apotheke.earth/tags/chinese" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chinese</span></a> <a href="https://social.apotheke.earth/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://social.apotheke.earth/tags/crawlers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crawlers</span></a> DDOSing your site is to make sure you are blocked by the <a href="https://social.apotheke.earth/tags/great" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Great</span></a> <a href="https://social.apotheke.earth/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a></p><p><a href="https://aethrvmn.gr/glory-ccp" rel="nofollow noopener noreferrer" target="_blank">https://aethrvmn.gr/glory-ccp</a></p><p>Now I just need a copypasta like that for <a href="https://social.apotheke.earth/tags/israel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Israel</span></a> so that <a href="https://social.apotheke.earth/tags/us" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> crawlers also stop crawling</p>
HistorySheWrote<p>Tech advice needed. </p><p>I need lightweight, simple and configurable firewall software for Windows 10. I have to keep my config going just a few more months and then will kick Windows to the curb. Zone Alarm Pro Firewall is my current software and they are dropping it in favor of a bulky suite that I hate.</p><p>Anyone have suggestions?<br><a href="https://mindly.social/tags/Windows10" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows10</span></a> <a href="https://mindly.social/tags/ZoneAlarm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZoneAlarm</span></a> <a href="https://mindly.social/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a></p>
Jordan<p>Currently over 1k incoming IPs banned in the last 72 hours from my firewall for malicious activity. A new record - Winning! 😂</p><p><a href="https://fosstodon.org/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://fosstodon.org/tags/scriptkiddies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scriptkiddies</span></a> <a href="https://fosstodon.org/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> <a href="https://fosstodon.org/tags/fail2ban" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fail2ban</span></a> <a href="https://fosstodon.org/tags/wordpress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wordpress</span></a> <a href="https://fosstodon.org/tags/lamers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lamers</span></a> <a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://fosstodon.org/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a></p>
Linux Renaissance<p><strong>You Want To Host Your Own PeerTube Server, Right?</strong></p> <p><a href="https://video.fosshq.org/w/egFPF4pdjKcAsnEiBNLq9f" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">video.fosshq.org/w/egFPF4pdjKc</span><span class="invisible">AsnEiBNLq9f</span></a></p>
Bytes Europe<p>What a spectacle! — Portugal’s government collapses – Democracy and society <a href="https://www.byteseu.com/843609/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">byteseu.com/843609/</span><span class="invisible"></span></a> <a href="https://pubeurope.com/tags/Corruption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Corruption</span></a> <a href="https://pubeurope.com/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://pubeurope.com/tags/Montenegro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Montenegro</span></a> <a href="https://pubeurope.com/tags/NewElections" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NewElections</span></a> <a href="https://pubeurope.com/tags/Portugal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Portugal</span></a> <a href="https://pubeurope.com/tags/ShiftToTheRight" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ShiftToTheRight</span></a> <a href="https://pubeurope.com/tags/SocialistParty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialistParty</span></a></p>
samenome<p>"Don't use shorewall anymore, it's old" my stupid brain said. And who wants to be 'old'? Not me. No. I am hip, chic, sprightly-brained. I also live a very happy rich fantasy existence, keep that pin away from my bubble!</p><p>DuckDuckGo: 'nftables replacement for shorewall' gets: <br>"Just accept that Firewalld is a major player, and that iptables is on its way out with nftables being more robust and consistent. And nftables is the default Firewalld back end. Firewalld is good once you get used to what it's doing. And it's the default on Fedora/CentOS/RHEL and SUSE/openSUSE Leap/Tumbleweed. "</p><p>I am always using <a href="https://aus.social/tags/Debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Debian</span></a>, (because, ahem, old? I'd dare not say) including on this firewall box. But, there's a firewalld package. Probably best to go with the flow ....</p><p>So I install firewalld, then muck about with dnsmasq, then turn back to fiirewalld, which seems enabled without me asking consciously asking for it (?) oh well ...</p><p>Then I get to:<br>Machine: A zone called 'work' exists.<br>Me: nnah, not here in my shed it doesn't.<br><a href="https://aus.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a>-cmd --delete-zone=work --permanent<br>Machine: Error: BUILTIN_ZONE: 'work' is built-in zone</p><p>What!? Say the fuck WHAT? "work"???<br>What fresh hell is this? Am I not allowed to be away from work even here at my shed with the magpies and roos?</p><p>Christ on a bike. Well I'll just get my bigger stick, and do:<br><a href="https://aus.social/tags/rm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rm</span></a> /etc/firewalld/zones/work*<br>and restart firewalld.<br>... It is back ... 🤐 <br>Machine: Error: BUILTIN_ZONE: 'work' is built-in zone<br>Oh. ComeTheFuckON!</p><p><a href="https://aus.social/tags/firewalld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalld</span></a>, unless something changes my mind in the night, you are headed for the bin in the morning. </p><p>And some unasked-for advice from me to the <a href="https://aus.social/tags/firewalld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalld</span></a> people: You MIGHT, just might, have permanent built-ins for 'drop' and 'bridge', ... perhaps. But 'work'? Fuck off to the place with the fuckoff sign, read it carefully, then fuck off further, yes and your friends too. Example zones? fine. Recipes about common 'internal'/'dmz'/'external' arrangements? also fine. Helpful in fact. Demanding that I have a "work" zone??? </p><p>'WORK' </p><p><a href="https://aus.social/tags/JFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JFC</span></a> <a href="https://aus.social/tags/cunts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cunts</span></a></p><p>To think that I fought the good fight for the cultural insensitivity of <a href="https://aus.social/tags/DMZ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DMZ</span></a>. (oh yeah - that little fucker? built-in too, ofCourseItIs)<br>What a waste of my time.<br> <br><a href="https://aus.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> people: If you had a four-port PCbox configured as a debian <a href="https://aus.social/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a>, what would you use to make the configuration of <a href="https://aus.social/tags/nftables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nftables</span></a> easy/safe/happy/fucker-free?</p>