i'm glad that my proxmox environment is no-stakes so i can learn — configuring firewalls in this context is mind-boggling.
“Schools and libraries participating in the program will be able to reimburse things like advanced firewalls, identity protection and authentication services, malware protection, and VPNs.”
FCC is offering $200 million to protect schools and libraries from hackers - https://www.theverge.com/2024/10/2/24260459/fcc-schools-libraries-cybersecurity-pilot-universal-service-fund
Schools and localities have become targets of ransomware.
I get that, I do. The bigger headache right now is: what if someone asks the wrong question before our measures get through his own firewalls? It's the 'yeah but what if the worst thing possible happens' anxiety. Honestly, I'm not that worried about [your] intel, it's everyone else's.
Linux terminal, firewalls, general admin crap running servers on virtual KVMs is a free option or Pi's. Only need tiny bit of resources. Bash scripting, github.. HTML5, CSS3, JS.. NGINX, PHP, MySQL, NodeJS.. WebSockets and make an API, MVC structure and why your doc root != script root lel. 👍🏻
Isn't it fun when people at work can't join an important EU veterinary conference because the people in charge at the EU Veterinary Commission have decided to use a meeting tool that uses IPs we have hard banned in our firewalls for security reasons. Happy Cyber Security Month!
Impossibly to tell who this outright neonazi is, just too many firewalls, VPNs, rerouting, misdirection, cover-ups & straight up uncrackable aliases! Could be anyone, could be me, could be you! God only knows!
I have something similar, where breaking into someone’s neural implant and frying their minds/stealing their actual memories/implanting false memories isn’t illegal, but breaking through proprietary firewalls is
Maximizing Cloud Network Security With Next-Generation Firewalls (NGFWs): Key Strategies for Performance and Protection feeds.dzone.com/link...
Learn how maximizing cloud security with Next-Generation Firewalls balances performance, threat detection, and proactive defense strategies.