eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

216
active users

#firewall

6 posts6 participants1 post today
heise online English<p>Sophos Firewall: Hotfixes eliminate remote attack threat</p><p>Important hotfixes patch firewall gaps that could be abused for remote code execution.</p><p><a href="https://www.heise.de/en/news/Sophos-Firewall-Hotfixes-eliminate-remote-attack-threat-10496459.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Sophos-Firewa</span><span class="invisible">ll-Hotfixes-eliminate-remote-attack-threat-10496459.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Sophos Firewall: Hotfixes beseitigen Remote-Angriffsgefahr</p><p>Wichtige Hotfixes flicken Firewall-Lücken, die zur Codeausführung aus der Ferne missbraucht werden könnten.</p><p><a href="https://www.heise.de/news/Sophos-Firewall-Hotfixes-beseitigen-Remote-Angriffsgefahr-10496271.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sophos-Firewall-</span><span class="invisible">Hotfixes-beseitigen-Remote-Angriffsgefahr-10496271.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> mistakenly tags <a href="https://mastodon.thenewoil.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mastodon.thenewoil.org/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> error log <a href="https://mastodon.thenewoil.org/tags/bug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bug</span></a> as fixed</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-mistakenly-tags-windows-firewall-error-log-bug-as-fixed/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-mistakenly-tags-windows-firewall-error-log-bug-as-fixed/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
heise online English<p>OPNsense 25.1.11: Last maintenance release before version 25.7</p><p>The router and firewall distribution OPNsense brings final bug fixes for the 25.1 branch. Version 25.7 marks the switch to FreeBSD 14.3.</p><p><a href="https://www.heise.de/en/news/OPNsense-25-1-11-Last-maintenance-release-before-version-25-7-10492736.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/OPNsense-25-1</span><span class="invisible">-11-Last-maintenance-release-before-version-25-7-10492736.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/BSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSD</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
iX Magazin<p>OPNsense 25.1.11: Letztes Maintenance-Release vor Version 25.7</p><p>Die Router- und Firewall-Distribution OPNsense bringt letzte Bugfixes für den 25.1-Zweig. Mit Version 25.7 kommt der Umstieg auf FreeBSD 14.3.</p><p><a href="https://www.heise.de/news/OPNsense-25-1-11-Letztes-Maintenance-Release-vor-Version-25-7-10492650.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/OPNsense-25-1-11</span><span class="invisible">-Letztes-Maintenance-Release-vor-Version-25-7-10492650.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/BSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSD</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Simon Brooke<p><span class="h-card" translate="no"><a href="https://mastodon.social/@glynmoody" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>glynmoody</span></a></span> OK, yes, I definitely don't want this on my computer. But <a href="https://mastodon.scot/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> is my currently preferred web browser, and browsers based on Chromium are undoubtedly less trustworthy.</p><p>So how do I block <a href="https://mastodon.scot/tags/OpenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenAI</span></a>'s API at the <a href="https://mastodon.scot/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a>?</p>
iX Magazin<p>iX-Workshop: Sicherer Betrieb von Windows 11 in Unternehmen</p><p>Lernen Sie an praktischen Beispielen, wie Sie Windows 11 Pro und Enterprise in Ihrem Unternehmen sicher und effektiv einsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Sicherer-Betrieb-von-Windows-11-in-Unternehmen-10465534.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Sich</span><span class="invisible">erer-Betrieb-von-Windows-11-in-Unternehmen-10465534.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Peter N. M. Hansteen<p>Long rumored, eagerly anticipated by some, "The Book of PF, 4th edition" <a href="https://nostarch.com/book-of-pf-4th-edition" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nostarch.com/book-of-pf-4th-ed</span><span class="invisible">ition</span></a> is now available for PREORDER. The most up to date guide to the OpenBSD and FreeBSD networking toolset <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/pf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pf</span></a> <a href="https://mastodon.social/tags/packetfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetfilter</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/preorder" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>preorder</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> (again for the CEST-ish crowd)</p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> asks users to ignore <a href="https://mastodon.thenewoil.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mastodon.thenewoil.org/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> config errors</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-asks-users-to-ignore-windows-firewall-config-errors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-asks-users-to-ignore-windows-firewall-config-errors/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
das nächste bitte<p>Ich brauche mal die Hilfe von <a href="https://social.tchncs.de/tags/RethinkDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RethinkDNS</span></a> Nutzern. Ich habe eine neue App installiert und irgendwas wird von RethinkDNS blockiert, sodass die App (vvs mobil) nicht funktioniert.<br>Schaue ich in die Protokolle werden alle DNS Anfragen beantwortet. Auch in der App Übersicht werden alle Verbindungen als erfolgreich angezeigt.<br>Ich habe sowohl mit RDNSplus als auch mit System DNS versucht. Ich habe mit Wireguard Umleitung und ohne probiert. </p><p>Hat Jemand eine Idee wo ich noch dran schrauben kann?<br><a href="https://social.tchncs.de/tags/adblocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adblocker</span></a> <a href="https://social.tchncs.de/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://social.tchncs.de/tags/fedihelp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedihelp</span></a></p>
Hessenhelden<p>Angeschlossen und erstmals gestartet. Was mich wundert dass es sehr warm im Betrieb wird. Ich kann es nicht einschätzen ob das normal ist aber wenn jetzt schon so viel Hitze erzeugt wird, bei wenig last, werden die elektrische Bauteile nicht lange durchhalten.</p><p><a href="https://mastodon.social/tags/opnsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opnsense</span></a> <a href="https://mastodon.social/tags/cwwk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cwwk</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/appliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appliance</span></a></p>
BastilleBSD :freebsd:<p>Say I have a table defined in pf.conf that includes both ip4 and ip6 addresses. When I create my rdr or pass rules that reference this table, do I need to create two entries, one for inet and another for inet6?</p><p><a href="https://fosstodon.org/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://fosstodon.org/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://fosstodon.org/tags/ipv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipv6</span></a></p>
Waidler :mastodon:<p>Endlich funktioniert die Endpoint-Erkennung VLAN-übergreifend wieder bei meinem ROON Server. ROON hätte gerne alle Klienten im gleichen Netzwerksegment. Dann klappt die Erkennung auf Anhieb. Bei mehreren VLANs wird's dann schwierig. Da muß man tiefer in die Trickkiste bei den Multicast-Einstellungen greifen. <br>Alte Firewallregeln in der OPNsense-Firewall entfernt und gut durchdachte neue hinzugefügt und schon funktioniert es wieder VLAN-übergreifend.</p><p><a href="https://bayerwald.social/tags/roon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>roon</span></a> <a href="https://bayerwald.social/tags/multicast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>multicast</span></a> <a href="https://bayerwald.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://bayerwald.social/tags/opnsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opnsense</span></a> <a href="https://bayerwald.social/tags/mdns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mdns</span></a></p>
Tech Singer<p>There are allot of people here who understand the world in my particular way, so I thought I'd throw this out and see if anyone has done this sort of thing before and can save me from wheel reinvention. I have a <a href="https://tweesecake.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> machine running <a href="https://tweesecake.social/tags/Windows10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows10</span></a> which I want to connect to the internet as follows. It has to be <a href="https://tweesecake.social/tags/portable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>portable</span></a>. It has to have access only to a very specific and limited number of IP addresses and DNS names which I will identify in advance and which I will edit by hand. It has to block access to everything else including Microsoft's machines, Google's machines, Basically, if it's not on my list, the machine will not connect to it. Whether the machine wants to connect to an IP address, a DNS name, or a device on the local network, I want connections to be promptly blocked. By promptly, I mean that I want the machine not to time out trying to connect to the stuff not on my list, I want the machine to be told no as soon as it tries. I want this because the machine shouldn't be waiting to timeout, it should just be doing what I told it without wasting cycles and time trying to talk to devices I don't want it talking to. The obvious solution is some sort of <a href="https://tweesecake.social/tags/whitelisting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitelisting</span></a> <a href="https://tweesecake.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> or <a href="https://tweesecake.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> system, but I have three problems there. First, I'm <a href="https://tweesecake.social/tags/blind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blind</span></a> and need <a href="https://tweesecake.social/tags/a11y" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>a11y</span></a> with <a href="https://tweesecake.social/tags/Jaws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jaws</span></a> and <a href="https://tweesecake.social/tags/NVDA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NVDA</span></a>. Secondly, as I said, it has to be portable, so I can't carry around a second box with a firewall. Thirdly, the machine has both ireless and ethernet access. I want both ports to have access only to the IPs/names I specify. Whether the machine is connected over ethernet or 802.11, I want those rules to be in effect. I have considered MS' firewall, but am nervous that it will let the machine talk to MS, which I don't want it to. Is any of this even possible? Boosts would be appreciated.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GrapheneOS</span></a></span> <span class="h-card" translate="no"><a href="https://fedi.omada.cafe/@fluffery" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fluffery</span></a></span> <span class="h-card" translate="no"><a href="https://chaos.social/@maumau" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>maumau</span></a></span> <span class="h-card" translate="no"><a href="https://social.tchncs.de/@BryanGreyson" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BryanGreyson</span></a></span> <span class="h-card" translate="no"><a href="https://mas.to/@fairphone" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fairphone</span></a></span> I.e. <span class="h-card" translate="no"><a href="https://mstdn.social/@BrodieOnLinux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BrodieOnLinux</span></a></span> could not use any of those because they don't support <a href="https://infosec.space/tags/VoLTE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VoLTE</span></a> (not just in <a href="https://infosec.space/tags/Australia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Australia</span></a>) and thus would be blocked by the <a href="https://infosec.space/tags/IMEI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IMEI</span></a>-<a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a>!<br><a href="https://www.youtube.com/watch?v=zIJavqEzEIw" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=zIJavqEzEIw</span><span class="invisible"></span></a></p>
Linuxiac<p>IPFire 2.29 Core Update 195 open-source firewall is out, adding long-awaited WireGuard VPN support and easy-to-configure tunneling options.<br><a href="https://linuxiac.com/ipfire-2-29-core-update-195-firewall-brings-native-wireguard-support/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxiac.com/ipfire-2-29-core-</span><span class="invisible">update-195-firewall-brings-native-wireguard-support/</span></a></p><p><a href="https://mastodon.social/tags/ipfire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipfire</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://mastodon.social/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
B'ad Samurai 🐐<p>A list of 3rd party file mirrors you may not want users accessing.</p><p><a href="https://github.com/BadSamuraiDev/bs-lists/blob/main/file-mirrors.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/BadSamuraiDev/bs-li</span><span class="invisible">sts/blob/main/file-mirrors.txt</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/list" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>list</span></a> <a href="https://infosec.exchange/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a></p>
heise online English<p>Cisco: Fresh firewalls from 1.5 to 400 Gbit/s throughput</p><p>Cisco completes its security portfolio with new firewalls, CVE protection on data center switches and uniform guidelines.</p><p><a href="https://www.heise.de/en/news/Cisco-Fresh-firewalls-from-1-5-to-400-Gbit-s-throughput-10452465.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Cisco-Fresh-f</span><span class="invisible">irewalls-from-1-5-to-400-Gbit-s-throughput-10452465.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Switch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Switch</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
iX Magazin<p>Cisco: Frische Firewalls von 1,5 bis 400 Gbit/s Durchsatz</p><p>Cisco komplettiert sein Sicherheitsportfolio mit neuen Firewalls, CVE-Schutz auf Rechenzentrumsswitchen und einheitlichen Richtlinien.</p><p><a href="https://www.heise.de/news/Cisco-Frische-Firewalls-von-1-5-bis-400-Gbit-s-Durchsatz-10451983.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Cisco-Frische-Fi</span><span class="invisible">rewalls-von-1-5-bis-400-Gbit-s-Durchsatz-10451983.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Switch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Switch</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
iX Magazin<p>iX-Workshop: Sicherer Betrieb von Windows 11 in Unternehmen</p><p>Lernen Sie an praktischen Beispielen, wie Sie Windows 11 Pro und Enterprise in Ihrem Unternehmen sicher und effektiv einsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Sicherer-Betrieb-von-Windows-11-in-Unternehmen-10443417.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Sich</span><span class="invisible">erer-Betrieb-von-Windows-11-in-Unternehmen-10443417.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>