KADALI SIVA KUMARkk4977.hashnode.dev·Apr 21, 2024Difference Between Hard Links and Soft LinksHard Links hardlink is a feature in file systems (like those found in Unix-based operating systems such as Linux) that allows multiple filenames (or directory entries) to refer to the same physical file data on disk. When we create a hardlink to a fi...Discuss·1 like·116 readsLinux
Emmanuel Oyiboemminex.hashnode.dev·Apr 8, 2024Understanding Linux FirewalldA firewall acts as a security guard for your computer’s network. It monitors the information going in and out, deciding what’s allowed and not. Therefore, understanding the firewall of your Linux system is an essential part of keeping it safe. Firewa...Discuss·10 likesLinux
Matias MartinezforBlog de CloudAcademyblog.cloudacademy.ar·Apr 6, 2024Stateful vs Stateless: Comprendiendo las Diferencias y Usos Comunes en Networking de AWSEn el vasto mundo de la computación en la nube, la arquitectura de red desempeña un papel crucial en la garantía de la seguridad, la disponibilidad y el rendimiento de las aplicaciones y servicios. En el contexto de Amazon Web Services (AWS), dos con...DiscussAWSAWS
MeghOpsforMeghOpsblog.meghops.io·Mar 31, 2024Demystifying Firewall Protection (Safeguarding Your Digital World)A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a private network (such as a corporate network or a home network) and an untr...DiscussFirewall Protection
Aaron Hackneyblog.hacksbrain.com·Mar 18, 2024Cisco TRex Packet Generator - Step by StepThe Cisco TRex Realistic Traffic Generator is open-source, free software that allows a user to send real-world traffic through a device for testing the device's load capabilities or other device features. In this article, I will endeavor to explain m...Discuss·2.1K readstrex
Jay Tillublogs.jaytillu.in·Mar 18, 2024What is a Firewall in Networking?A firewall is a security system that acts as a gatekeeper for your computer network. It monitors incoming and outgoing traffic based on a set of rules, deciding whether to allow or block specific data packets. In essence, it creates a barrier between...DiscussNetworking#cybersecurity
Nehal IngoleforRead & Learnlearnwithnehal.hashnode.dev·Mar 12, 2024Jenkins FirewallIntroduction Jenkins is a popular automation server used for continuous integration and continuous delivery (CI/CD) pipelines in software development. To allow external access to Jenkins, it's essential to configure the firewall to permit traffic on ...DiscussDevopsJenkins
Ahmed Aymana7medayman.hashnode.dev·Mar 5, 2024Hardening your Linux server's security: a step-by-step guideAs a system administrator, it's your responsibility to ensure the security of your Linux servers. With hackers and cyber criminals constantly finding new ways to target servers, it's important to take proactive measures to protect your systems. In th...DiscussLinux
Gift Alufandikagiftiea.hashnode.dev·Feb 26, 2024A Closer Look at What Happens When You Type https://www.google.com in your browser and Press EnterDNS request When you type in https://www.google.com and press enter, the first step is initiating a Domain Name System (DNS) request. This process involves translating the human-readable domain name "google.com" into a numerical IP address that the ...Discussdns
Brzozovabelikeneoandtrinity.hashnode.dev·Feb 16, 2024Basic firewall rules configuration in GCP using TerraformFirewall rules are one of the very first things you should take care of when configuring a network, so I decided to show how to do it based on my experience with GCP and Terraform. Generally speaking, the fewer IPs, and ports allowed, the better for ...Discussfirewall