mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

13K
active users

#firewalls

1 post1 participant0 posts today
computing competence<a href="https://feinste-netzwerke.de?t=wochenbericht" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Wochenbericht</a> KW23:<br><br>- Mo: Vorbereitung Laptop per <a href="https://feinste-netzwerke.de?t=openvpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OpenVPN</a> für <a href="https://feinste-netzwerke.de?t=homeoffice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Homeoffice</a>. <a href="https://feinste-netzwerke.de?t=update" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Update</a> einer <a href="https://feinste-netzwerke.de?t=zeiterfassung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Zeiterfassung</a>. <a href="https://feinste-netzwerke.de?t=mailstore" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Mailstore</a> neu an <a href="https://feinste-netzwerke.de?t=m365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#M365</a> angebunden<br>- Di: Aufbau einer <a href="https://feinste-netzwerke.de?t=usv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#USV</a> und Datenmigration von <a href="https://feinste-netzwerke.de?t=synology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Synology</a> auf <a href="https://feinste-netzwerke.de?t=truenas" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#TrueNAS</a>. Installation einer Testumgebung mit <a href="https://feinste-netzwerke.de?t=windowsserver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#WindowsServer</a><br>- Mi: Beratung rund um <a href="https://feinste-netzwerke.de?t=webserver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Webserver</a>, die am besten in einer <a href="https://feinste-netzwerke.de?t=dmz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#DMZ</a> landen sollten, so wie <a href="https://feinste-netzwerke.de?t=netzwerksegmentierung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Netzwerksegmentierung</a> im allgemeinen. <a href="https://feinste-netzwerke.de?t=firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Firewall</a> Regeln dürfen dabei nicht vergessen werden. Einsatz der Testumgegung von Dienstag. Aufbau neuer PC und Datenübernahme<br>- Do: Fehlersuche <a href="https://feinste-netzwerke.de?t=sip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#SIP</a> Trunks. Neuen <a href="https://feinste-netzwerke.de?t=unifi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Unifi</a> Acces Point eingebunden<br>- Fr: Aufwendige <a href="https://feinste-netzwerke.de?t=email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#EMail</a> Migration von All-Inkl zu Strato mit wunderbare Migrationsassistent. Backup mit <a href="https://feinste-netzwerke.de?t=offlineimap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#offlineimap</a><br><br><a href="https://feinste-netzwerke.de?t=highlight" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Highlight</a>: Erste Updates von <a href="https://feinste-netzwerke.de?t=opnsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OPNsense</a> <a href="https://feinste-netzwerke.de?t=firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Firewalls</a> durch das neue <a href="https://feinste-netzwerke.de?t=personal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Personal</a>. Prima!<br>
TechNewsRo<p><a href="https://mastodon.social/tags/ZyxelNetworks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZyxelNetworks</span></a> ranks in <a href="https://mastodon.social/tags/Champion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Champion</span></a> rankings for <a href="https://mastodon.social/tags/firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalls</span></a> and <a href="https://mastodon.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a></p><p><a href="https://technewsro.blog/zyxel-networks-se-claseaza-n-clasamentul-champion-pentru-firewall-uri-si-vpn-uri/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">technewsro.blog/zyxel-networks</span><span class="invisible">-se-claseaza-n-clasamentul-champion-pentru-firewall-uri-si-vpn-uri/</span></a></p>
Diego Cordoba 🇦🇷<p>[Resumen semanal]</p><p>Cerrando una semana bastante fría, de mucho trabajo, que arrancó con un lunes nublado y sin luz, que parece que pasó hace 3 meses.</p><p>La semana que viene sale contenido nuevo en el blog de juncotic.com! Estamos cocinando posts sobre <a href="https://mstdn.io/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> y <a href="https://mstdn.io/tags/pandas" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pandas</span></a>, <a href="https://mstdn.io/tags/redes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redes</span></a> <a href="https://mstdn.io/tags/TCPIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCPIP</span></a> y <a href="https://mstdn.io/tags/firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalls</span></a> 😃 </p><p>También seguiré grabando nuevas clases del <a href="https://mstdn.io/tags/curso" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>curso</span></a> de <a href="https://mstdn.io/tags/NFTables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NFTables</span></a>! Ya jugando con los comandos! 😄 </p><p>Foto: pedaleada de hoy, descargando estrés! 🚴 (si usan strava me avisan y nos seguimos)</p>
Victorock Kenya Limited<p><a href="https://mastodon.social/tags/Sophos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sophos</span></a> is an award-winning <a href="https://mastodon.social/tags/endpoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>endpoint</span></a> and <a href="https://mastodon.social/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://mastodon.social/tags/threat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threat</span></a> <a href="https://mastodon.social/tags/protection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>protection</span></a>, trusted by more than half a million customers worldwide. Call 0706357055 or email us on info@victorockkenya.com. <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/OrderSophos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OrderSophos</span></a> <a href="https://mastodon.social/tags/Firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewalls</span></a> <a href="https://mastodon.social/tags/AccessPoints" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AccessPoints</span></a></p><p><a href="https://victorockkenya.com/order-sophos/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">victorockkenya.com/order-sopho</span><span class="invisible">s/</span></a></p>
Hacker News<p>Firewalls and BIOS's and Coreboot (2020)</p><p><a href="https://hagensieker.com/2020/11/08/firewalls-and-bioss-and-coreboot/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hagensieker.com/2020/11/08/fir</span><span class="invisible">ewalls-and-bioss-and-coreboot/</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewalls</span></a> <a href="https://mastodon.social/tags/Coreboot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Coreboot</span></a> <a href="https://mastodon.social/tags/BIOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BIOS</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Tech2020" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech2020</span></a></p>
Andy S. Evers<p>Umgehen von <a href="https://social.cologne/tags/Firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewalls</span></a> möglich Versteckte <a href="https://social.cologne/tags/Kommunikationsmodule" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kommunikationsmodule</span></a> in Solarwechselrichtern aus <a href="https://social.cologne/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> <a href="https://social.cologne/tags/PV" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PV</span></a> <a href="https://social.cologne/tags/Solar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Solar</span></a> <a href="https://www.security-insider.de/us-sicherheitsbedenken-chinesische-solarwechselrichter-a-08272a63260dfa57ee2c903fd338b4f9/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security-insider.de/us-sicherh</span><span class="invisible">eitsbedenken-chinesische-solarwechselrichter-a-08272a63260dfa57ee2c903fd338b4f9/</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> Q: I wish there was a similar tool test <a href="https://infosec.space/tags/Bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bridges</span></a>, as <a href="https://bridges.torproject.org/scan/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bridges.torproject.org/scan/</span><span class="invisible"></span></a> is not that good and I don't want to hammer it with dozens of addresses, cuz at best that's quite antisocial if not possibly trigger responses assuming this is an intelligence gathering operation.</p><ul><li>Ideally sone standalone binary that one can just give a list of <a href="https://infosec.space/tags/TorBridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridge</span></a>|s in a text file (similar to the way one can just past them in at <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a>) would help.</li></ul><p>I.e. </p><pre><code>bridgetest -v4 obfs4 203.0.113.0:80 …<br><br>bridgetest -v6 webtunnel [2001:DB8::1]:443 …<br><br>bridgetest -list ./tor.bridges.list.private.tsv <br></code></pre><ul><li>But maybe <a href="https://infosec.space/tags/onionprobe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>onionprobe</span></a> already does that. In that case please tell me to <em>"<a href="https://infosec.space/tags/RTFM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RTFM</span></a>!"</em>…</li></ul><p>Similarly there needs to be a more granular way to request <a href="https://infosec.space/tags/TorBridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBridges</span></a> from <a href="https://infosec.space/tags/BridgeDB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BridgeDB</span></a> (as it's basically impossible to get <a href="https://infosec.space/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a> <a href="https://infosec.space/tags/Webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Webtunnel</span></a> addresses nor is there an option to filter for <a href="https://infosec.space/tags/ports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ports</span></a> like <code>:80</code> &amp; <code>:443</code> to deal with restrictive <a href="https://infosec.space/tags/firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalls</span></a> (i.e. on public <a href="https://infosec.space/tags/WiFi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WiFi</span></a>)…</p><ul><li>there are flags like <code>ipv6=yes</code> but neither <code>ipv4=yes</code> nor <code>ipv6=no</code> yielded me other resultd than <a href="https://infosec.space/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> <code>webtunnel</code> bridges…</li></ul><p>And before anyone asks: Yes, I do have a <em>"legitimate purpose"</em> as some of my contacts do need Bridges to get beyond a mandatory firewall and/or do use <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> (through an <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> tunnel) to circumvent Tor &amp; <a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> blocks and maintain privacy (as many companies do block sometimes entire <a href="https://infosec.space/tags/Hosters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hosters</span></a>' ASNs due to rampant <a href="https://infosec.space/tags/scrapers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scrapers</span></a>…</p>
MrsNo1Special<p>Behavioral firewalls are quietly taking over as the digital sentinels of modern cybersecurity architecture. Unlike traditional firewalls that act like bouncers blocking known threats at the gate, behavioral firewalls operate more like surveillance analysts — tracking, interpreting, and...</p><p><a href="https://medium.com/@mrsno1special/behavioral-firewalls-and-psychological-profiling-are-we-coding-paranoia-into-cybersecurity-79e5b96c3301" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@mrsno1special/beha</span><span class="invisible">vioral-firewalls-and-psychological-profiling-are-we-coding-paranoia-into-cybersecurity-79e5b96c3301</span></a></p><p># <a href="https://mastodon.social/tags/behavioral" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>behavioral</span></a> <a href="https://mastodon.social/tags/firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalls</span></a> <a href="https://mastodon.social/tags/quietly" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quietly</span></a> <a href="https://mastodon.social/tags/taking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>taking</span></a> <a href="https://mastodon.social/tags/digital" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digital</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://tweesecake.social/@adisonverlice" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>adisonverlice</span></a></span> I think that's dangerous disinfo as <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> actively works against attempts to fingerprint and track <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> users.</p><ul><li>I do consider Tor more private than any <a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> simply becaise they can neither ban users nor identify them.</li></ul><p>In fact, Tor has been designed with the explicit goal to circumvent <a href="https://infosec.space/tags/Firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewalls</span></a> and <a href="https://infosec.space/tags/InternetCensorship" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetCensorship</span></a> methods like <a href="https://infosec.space/tags/DeepApcketInspection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepApcketInspection</span></a>.</p><ul><li>Which is why <a href="https://infosec.space/tags/OnionShare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnionShare</span></a> by <span class="h-card" translate="no"><a href="https://infosec.exchange/@micahflee" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>micahflee</span></a></span> works so great!</li></ul><p>As a matter of principle I'd never vouch for any <a href="https://infosec.space/tags/centralized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>centralized</span></a>, <a href="https://infosec.space/tags/SingleVendor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SingleVendor</span></a> and/or <a href="https://infosec.space/tags/SingleProvider" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SingleProvider</span></a> solution of any kind, including <a href="https://infosec.space/tags/Session" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Session</span></a>.</p><ul><li>Tor is sufficiently decentralized in that it is not only completely <a href="https://infosec.space/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> but has proven to not have SPOFs in the form of maintainers and is able to <em>yeet</em> proplematic folks (unlike <a href="https://infosec.space/tags/WikiLeaks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WikiLeaks</span></a>!)…</li></ul>
isecjobs.com<p>HIRING: Deputy Director, Physical &amp; Cyber Security / San Jose, California<br>💰 USD 208K+</p><p>👉 <a href="https://isecjobs.com/J882697/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">isecjobs.com/J882697/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/Analytics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Analytics</span></a> <a href="https://mastodon.social/tags/Audits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Audits</span></a> <a href="https://mastodon.social/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> <a href="https://mastodon.social/tags/CISM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISM</span></a> <a href="https://mastodon.social/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://mastodon.social/tags/CISSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISSP</span></a> <a href="https://mastodon.social/tags/Clearance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Clearance</span></a> <a href="https://mastodon.social/tags/Compliance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Compliance</span></a> <a href="https://mastodon.social/tags/Firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewalls</span></a> <a href="https://mastodon.social/tags/Incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Incidentresponse</span></a> <a href="https://mastodon.social/tags/SanJose" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SanJose</span></a> <a href="https://mastodon.social/tags/CyberSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSec</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/VTA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VTA</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://fedi.sillykittens.net/@k4m1" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>k4m1</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@stman" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>stman</span></a></span> yeah, according to <a href="http://realtek.info/pdf/rtl8139cp.pdf" rel="nofollow noopener noreferrer" target="_blank">the</a> <a href="https://infosec.space/tags/RTL8139" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RTL8139</span></a> <a href="https://infosec.space/tags/datasheet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>datasheet</span></a> this is basically a very cheap 10/100M NIC designed <a href="https://infosec.space/tags/embedded" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>embedded</span></a> systems and low-end/low-cost desktops, and for a device designed and sold in 2006 it made sense, given back then <a href="https://infosec.space/tags/Gigabit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gigabit</span></a>-<a href="https://infosec.space/tags/Ethernet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ethernet</span></a> and Cat.5 cabling was considered high-end.</p><ul><li>And unlike contemporary / successor chips by <a href="https://infosec.space/tags/Intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intel</span></a> like the famous <a href="https://infosec.space/tags/i210" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>i210</span></a> (which is still offered as <a href="https://infosec.space/tags/i219" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>i219</span></a> but mostly succeeded by the <a href="https://infosec.space/tags/i225" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>i225</span></a> as a 2,5GBase-T version) is way cheaper, which pre-<a href="https://infosec.space/tags/RoHS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RoHS</span></a> - NICs being sold for like € 10 <em>retail &amp; brand-new</em>....</li></ul><p>The <a href="https://wiki.osdev.org/RTL8139" rel="nofollow noopener noreferrer" target="_blank">few issues known</a> only affect like <a href="https://infosec.space/tags/Virtualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Virtualization</span></a> setups, a market this thing was never designed for (most likely also never tested against).</p><ul><li>I'd not he surprised if a lot of cheap <a href="https://infosec.space/tags/ThinClients" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThinClients</span></a> and other systems used these NICs because of the simplicity of integration, being a cheap 3,3V single-chip (+auxilliary electronics) solution and propably costling less than 10¢ on a reel of 10.000.</li></ul><p>It's the reason why to this day we see <a href="https://infosec.space/tags/Realtek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Realtek</span></a> NICs being shipped instead of fanning-out &amp; enabling <a href="https://infosec.space/tags/SoC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoC</span></a>-integrated NICs with a <a href="https://infosec.space/tags/MAC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MAC</span></a> &amp; <a href="https://infosec.space/tags/PHY" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PHY</span></a> instead: Because the auxilliary parts for those are more expensive than just getting a PCI(e lane) somewhere and plonking it down.</p><ul><li>Maybe there have even been some really cheap, low-end <a href="https://infosec.space/tags/Routers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Routers</span></a> / <a href="https://infosec.space/tags/Firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewalls</span></a> aiming at <a href="https://infosec.space/tags/SoHo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoHo</span></a> customers back in those days, cuz back then 16MBit/s <a href="https://infosec.space/tags/ADSL2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ADSL2</span></a> was considered fast, and Realtek's NICs up until recently only delivered like 60-75% of the max. speed advertised, so by the time someone would notice, that gearvwould've been EoL'd anyway and those who did notice right-away never were the target audience to begin with.</li></ul><p>Most modern NICs are more complex and demand more configuration / driver support...</p>
Steve Dustcircle 🌹<p><a href="https://mastodon.social/tags/Hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hackers</span></a> are hitting <a href="https://mastodon.social/tags/firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalls</span></a> and <a href="https://mastodon.social/tags/VPNs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPNs</span></a> to breach <a href="https://mastodon.social/tags/businesses" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>businesses</span></a></p><p><a href="https://www.techradar.com/pro/security/hackers-are-hitting-firewalls-and-vpns-to-breach-businesses" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/hac</span><span class="invisible">kers-are-hitting-firewalls-and-vpns-to-breach-businesses</span></a></p>
Technodad<p>Sorry I've been quiet. Double whammy kept me from posting today. Flood loss tax return and OpenWRT firewalls - not sure which one was worse. <a href="https://cunnin.me/tags/death" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>death</span></a> <a href="https://cunnin.me/tags/taxes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>taxes</span></a> <a href="https://cunnin.me/tags/firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalls</span></a></p>
isecjobs.com<p>HIRING: Deputy Director, Physical &amp; Cyber Security / San Jose, California<br>💰 USD 208K+</p><p>👉 <a href="https://isecjobs.com/J806992/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">isecjobs.com/J806992/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/Analytics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Analytics</span></a> <a href="https://mastodon.social/tags/Audits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Audits</span></a> <a href="https://mastodon.social/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> <a href="https://mastodon.social/tags/CISM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISM</span></a> <a href="https://mastodon.social/tags/CISO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISO</span></a> <a href="https://mastodon.social/tags/CISSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISSP</span></a> <a href="https://mastodon.social/tags/Clearance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Clearance</span></a> <a href="https://mastodon.social/tags/Compliance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Compliance</span></a> <a href="https://mastodon.social/tags/Firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewalls</span></a> <a href="https://mastodon.social/tags/Incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Incidentresponse</span></a> <a href="https://mastodon.social/tags/VTA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VTA</span></a></p>
pandabutter<p>OK I figure I should update this, since I got a reply from Vermont: they weren't blocking <a href="https://plush.city/tags/LibreWolf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LibreWolf</span></a>. A bit more searching and it looks like <a href="https://plush.city/tags/firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalls</span></a> don't get along well with OCSP servers (unless otherwise configured), and LibreWolf enforces an OCSP check by default.<br>I've turned off the setting ("Enforce OCSP hard-fail" under about:preferences#librewolf) and I'll let y'all know if that worked next time I use the campus WiFi.</p>
PrivacyDigest<p><a href="https://mas.to/tags/PaloAlto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaloAlto</span></a> <a href="https://mas.to/tags/Firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewalls</span></a> Under <a href="https://mas.to/tags/Attack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Attack</span></a> As Miscreants Chain Flaws For <a href="https://mas.to/tags/Root" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Root</span></a> Access - Slashdot <br> <br>A recently patched <a href="https://mas.to/tags/PaloAltoNetworks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaloAltoNetworks</span></a> <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> (CVE-2025-0108) is being actively <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploited</span></a> alongside two older flaws (CVE-2024-9474 and CVE-2025-0111), allowing attackers to gain root access to unpatched firewalls. <br><a href="https://mas.to/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://it.slashdot.org/story/25/02/19/2059256/palo-alto-firewalls-under-attack-as-miscreants-chain-flaws-for-root-access?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it.slashdot.org/story/25/02/19</span><span class="invisible">/2059256/palo-alto-firewalls-under-attack-as-miscreants-chain-flaws-for-root-access?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</span></a></p>
Pyrzout :vm:<p>Palo Alto firewalls under attack as miscreants chain flaws for root access – Source: go.theregister.com <a href="https://ciso2ciso.com/palo-alto-firewalls-under-attack-as-miscreants-chain-flaws-for-root-access-source-go-theregister-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/palo-alto-firewa</span><span class="invisible">lls-under-attack-as-miscreants-chain-flaws-for-root-access-source-go-theregister-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/TheRegisterSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheRegisterSecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/TheRegister" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheRegister</span></a> <a href="https://social.skynetcloud.site/tags/firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalls</span></a></p>
PrivacyDigest<p>Joint Publications Focus on Mitigation Strategies for Edge Devices &gt; NSA/Central Security Service </p><p>FORT MEADE - The <a href="https://mas.to/tags/NSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSA</span></a> has joined the Australian Signals Directorate’s Australian Cyber <a href="https://mas.to/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> Centre (ASD’s ACSC), the Canadian Centre for Cyber Security (CCCS), &amp; others to release 3 guides <a href="https://mas.to/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> Info Sheets (CSIs) that highlight critically important mitigation strategies for securing edge device systems, including <a href="https://mas.to/tags/firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalls</span></a>, routers, &amp; <a href="https://mas.to/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> gateways. </p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4052657/joint-publications-focus-on-mitigation-strategies-for-edge-devices/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nsa.gov/Press-Room/Press-Relea</span><span class="invisible">ses-Statements/Press-Release-View/Article/4052657/joint-publications-focus-on-mitigation-strategies-for-edge-devices/</span></a></p>
@infosec_jcp 🐈🃏 done differently<p>Let's hope 2025 will bring back the popularity of <a href="https://infosec.exchange/tags/StatefulFirewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StatefulFirewalls</span></a> for the mobile space once again.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/Firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewalls</span></a> <a href="https://infosec.exchange/tags/mobile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobile</span></a></p>
Varjohaltia<p>How do you deal with the problem that a new security product is "sexy" and gets management support, but actually operating, maintaining and doing security rule tightening is "operational" and never gets any management visibility, resources or prioritization?<br><a href="https://infosec.exchange/tags/firewalls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalls</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>