toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

230
active users

#firewall

3 posts3 participants0 posts today
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> fixes bug behind incorrect <a href="https://mastodon.thenewoil.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mastodon.thenewoil.org/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> errors</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-bug-behind-incorrect-windows-firewall-errors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-fixes-bug-behind-incorrect-windows-firewall-errors/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> fixed two critical Sophos <a href="https://infosec.exchange/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> vulnerabilities<br><a href="https://securityaffairs.com/180283/security/sophos-addressed-five-sophos-firewall-vulnerabilities.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180283/sec</span><span class="invisible">urity/sophos-addressed-five-sophos-firewall-vulnerabilities.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a></p>
heise online English<p>Sophos Firewall: Hotfixes eliminate remote attack threat</p><p>Important hotfixes patch firewall gaps that could be abused for remote code execution.</p><p><a href="https://www.heise.de/en/news/Sophos-Firewall-Hotfixes-eliminate-remote-attack-threat-10496459.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Sophos-Firewa</span><span class="invisible">ll-Hotfixes-eliminate-remote-attack-threat-10496459.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
E-TARD The LifeCaster<p>So here is my new <a href="https://mastodon.online/tags/OPNsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OPNsense</span></a> Router.<br>My old router is a <a href="https://mastodon.online/tags/Linksys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linksys</span></a> WRT3200ACM running <a href="https://mastodon.online/tags/DDWRT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDWRT</span></a> &amp; it's blue, so I called it <a href="https://mastodon.online/tags/Tachikoma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tachikoma</span></a> from <a href="https://mastodon.online/tags/GhostInTheShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GhostInTheShell</span></a>.<br>So went with the same theme here.<br>I am really happy with it😁.<br>I'm still getting for feel for OPNsense &amp; where everything is<br>I've been playing with Suricata &amp; I got Zenarmor installed.</p><p>For more info about my network setup &amp; more Pic's<br>Click The Link: <a href="https://pcpartpicker.com/b/sK3ypg" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pcpartpicker.com/b/sK3ypg</span><span class="invisible"></span></a></p><p><a href="https://mastodon.online/tags/Intel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intel</span></a> <a href="https://mastodon.online/tags/OPNsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OPNsense</span></a> <a href="https://mastodon.online/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://mastodon.online/tags/Router" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Router</span></a> <a href="https://mastodon.online/tags/Suricata" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Suricata</span></a> <a href="https://mastodon.online/tags/Zenarmor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zenarmor</span></a> <a href="https://mastodon.online/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.online/tags/InFoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InFoSec</span></a></p>
heise Security<p>Sophos Firewall: Hotfixes beseitigen Remote-Angriffsgefahr</p><p>Wichtige Hotfixes flicken Firewall-Lücken, die zur Codeausführung aus der Ferne missbraucht werden könnten.</p><p><a href="https://www.heise.de/news/Sophos-Firewall-Hotfixes-beseitigen-Remote-Angriffsgefahr-10496271.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sophos-Firewall-</span><span class="invisible">Hotfixes-beseitigen-Remote-Angriffsgefahr-10496271.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> mistakenly tags <a href="https://mastodon.thenewoil.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mastodon.thenewoil.org/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> error log <a href="https://mastodon.thenewoil.org/tags/bug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bug</span></a> as fixed</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-mistakenly-tags-windows-firewall-error-log-bug-as-fixed/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-mistakenly-tags-windows-firewall-error-log-bug-as-fixed/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
ShawnT 🐀<p>Since <a href="https://mastodon.coffee/tags/Ubiquiti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ubiquiti</span></a> has long abandoned its <a href="https://mastodon.coffee/tags/EdgeRouter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EdgeRouter</span></a> Lite products and abandoned <a href="https://mastodon.coffee/tags/EdgeOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EdgeOS</span></a>, what are all the cool kids using for their home <a href="https://mastodon.coffee/tags/router" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>router</span></a> and <a href="https://mastodon.coffee/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a>? Is there a community firmware for this? Or should I look around for something just as powerful? A WebUI is great, but I'm also cool with CLI.</p>
heise online English<p>OPNsense 25.1.11: Last maintenance release before version 25.7</p><p>The router and firewall distribution OPNsense brings final bug fixes for the 25.1 branch. Version 25.7 marks the switch to FreeBSD 14.3.</p><p><a href="https://www.heise.de/en/news/OPNsense-25-1-11-Last-maintenance-release-before-version-25-7-10492736.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/OPNsense-25-1</span><span class="invisible">-11-Last-maintenance-release-before-version-25-7-10492736.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/BSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSD</span></a> <a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Simon Brooke<p><span class="h-card" translate="no"><a href="https://mastodon.social/@glynmoody" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>glynmoody</span></a></span> OK, yes, I definitely don't want this on my computer. But <a href="https://mastodon.scot/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> is my currently preferred web browser, and browsers based on Chromium are undoubtedly less trustworthy.</p><p>So how do I block <a href="https://mastodon.scot/tags/OpenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenAI</span></a>'s API at the <a href="https://mastodon.scot/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a>?</p>
Emanuele<p>«How to stop your <a href="https://m.divita.eu/tags/LG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LG</span></a> or <a href="https://m.divita.eu/tags/Samsung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Samsung</span></a> smart TV from <a href="https://m.divita.eu/tags/tracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tracking</span></a> you»</p><p><a href="https://appleinsider.com/inside/mac/tips/how-to-stop-your-lg-or-samsung-smart-tv-from-tracking-you" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">appleinsider.com/inside/mac/ti</span><span class="invisible">ps/how-to-stop-your-lg-or-samsung-smart-tv-from-tracking-you</span></a></p><p>My suggestion is to avoid connecting a monitor or <a href="https://m.divita.eu/tags/TV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TV</span></a> to the internet as much as possible, and instead favor more <a href="https://m.divita.eu/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a>-oriented "smart" platforms for accessing multimedia files or video <a href="https://m.divita.eu/tags/streaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>streaming</span></a> networks. Segmenting via VLANs and/or managing your own <a href="https://m.divita.eu/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> is always good practice—now more than ever.</p><p><a href="https://m.divita.eu/tags/privacyMatters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacyMatters</span></a> <a href="https://m.divita.eu/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://m.divita.eu/tags/SmartTV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmartTV</span></a></p>
Queen 1066<p>The antisemitism report would have benefited from a little — or any — understanding of basic public policy <a href="https://mastodon.au/tags/crikey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crikey</span></a> <a href="https://mastodon.au/tags/bernardkeane" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bernardkeane</span></a> <a href="https://mastodon.au/tags/jilliansegal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jilliansegal</span></a> <a href="https://mastodon.au/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.au/tags/antisemitism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>antisemitism</span></a> <a href="https://mastodon.au/tags/policy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>policy</span></a> <a href="https://mastodon.au/tags/auspol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>auspol</span></a> <a href="https://mastodon.au/tags/education" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>education</span></a><br><a href="https://www.crikey.com.au/2025/07/14/antisemitism-report-jillian-segal-understanding-public-policy/?utm_campaign=daily&amp;utm_medium=email&amp;utm_source=newsletter" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">crikey.com.au/2025/07/14/antis</span><span class="invisible">emitism-report-jillian-segal-understanding-public-policy/?utm_campaign=daily&amp;utm_medium=email&amp;utm_source=newsletter</span></a></p>
iX Magazin<p>iX-Workshop: Sicherer Betrieb von Windows 11 in Unternehmen</p><p>Lernen Sie an praktischen Beispielen, wie Sie Windows 11 Pro und Enterprise in Ihrem Unternehmen sicher und effektiv einsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Sicherer-Betrieb-von-Windows-11-in-Unternehmen-10465534.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Sich</span><span class="invisible">erer-Betrieb-von-Windows-11-in-Unternehmen-10465534.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Peter N. M. Hansteen<p>Long rumored, eagerly anticipated by some, "The Book of PF, 4th edition" <a href="https://nostarch.com/book-of-pf-4th-edition" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nostarch.com/book-of-pf-4th-ed</span><span class="invisible">ition</span></a> is now available for PREORDER. The most up to date guide to the OpenBSD and FreeBSD networking toolset <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/pf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pf</span></a> <a href="https://mastodon.social/tags/packetfilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>packetfilter</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/preorder" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>preorder</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> (again for the CEST-ish crowd)</p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>»Wild Wild Web:<br>Wild Wild Web erzählt Geschichten aus dem Internet. Mal Wissenschaft, mal Tech, mal Investigativ-Recherche und mal Tier-Doku. Janne Knödler und André Dér-Hörmeyer nehmen euch mit zum Headquarter von Spotify und hinter die Great Firewall.«</p><p>So alt ist das Web schon und auch deshalb eine eigene BR Podcast Reihe darüber.</p><p>🔊 <a href="https://www.ardaudiothek.de/sammlung/wild-wild-web/urn:ard:page:7c70d6d029ffcb1b/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ardaudiothek.de/sammlung/wild-</span><span class="invisible">wild-web/urn:ard:page:7c70d6d029ffcb1b/</span></a></p><p><a href="https://chaos.social/tags/podcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podcast</span></a> <a href="https://chaos.social/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://chaos.social/tags/wordwideweb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wordwideweb</span></a> <a href="https://chaos.social/tags/radio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>radio</span></a> <a href="https://chaos.social/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://chaos.social/tags/geschichte" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>geschichte</span></a> <a href="https://chaos.social/tags/spotify" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spotify</span></a> <a href="https://chaos.social/tags/headquarter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>headquarter</span></a> <a href="https://chaos.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://chaos.social/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> <a href="https://chaos.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://chaos.social/tags/greatfirewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>greatfirewall</span></a> <a href="https://chaos.social/tags/medien" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>medien</span></a> <a href="https://chaos.social/tags/recherche" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>recherche</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> asks users to ignore <a href="https://mastodon.thenewoil.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mastodon.thenewoil.org/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> config errors</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-asks-users-to-ignore-windows-firewall-config-errors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-asks-users-to-ignore-windows-firewall-config-errors/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
BastilleBSD :freebsd:<p>Say I have a table defined in pf.conf that includes both ip4 and ip6 addresses. When I create my rdr or pass rules that reference this table, do I need to create two entries, one for inet and another for inet6?</p><p><a href="https://fosstodon.org/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://fosstodon.org/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://fosstodon.org/tags/ipv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipv6</span></a></p>
Tech Singer<p>There are allot of people here who understand the world in my particular way, so I thought I'd throw this out and see if anyone has done this sort of thing before and can save me from wheel reinvention. I have a <a href="https://tweesecake.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> machine running <a href="https://tweesecake.social/tags/Windows10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows10</span></a> which I want to connect to the internet as follows. It has to be <a href="https://tweesecake.social/tags/portable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>portable</span></a>. It has to have access only to a very specific and limited number of IP addresses and DNS names which I will identify in advance and which I will edit by hand. It has to block access to everything else including Microsoft's machines, Google's machines, Basically, if it's not on my list, the machine will not connect to it. Whether the machine wants to connect to an IP address, a DNS name, or a device on the local network, I want connections to be promptly blocked. By promptly, I mean that I want the machine not to time out trying to connect to the stuff not on my list, I want the machine to be told no as soon as it tries. I want this because the machine shouldn't be waiting to timeout, it should just be doing what I told it without wasting cycles and time trying to talk to devices I don't want it talking to. The obvious solution is some sort of <a href="https://tweesecake.social/tags/whitelisting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whitelisting</span></a> <a href="https://tweesecake.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> or <a href="https://tweesecake.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> system, but I have three problems there. First, I'm <a href="https://tweesecake.social/tags/blind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blind</span></a> and need <a href="https://tweesecake.social/tags/a11y" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>a11y</span></a> with <a href="https://tweesecake.social/tags/Jaws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jaws</span></a> and <a href="https://tweesecake.social/tags/NVDA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NVDA</span></a>. Secondly, as I said, it has to be portable, so I can't carry around a second box with a firewall. Thirdly, the machine has both ireless and ethernet access. I want both ports to have access only to the IPs/names I specify. Whether the machine is connected over ethernet or 802.11, I want those rules to be in effect. I have considered MS' firewall, but am nervous that it will let the machine talk to MS, which I don't want it to. Is any of this even possible? Boosts would be appreciated.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GrapheneOS</span></a></span> <span class="h-card" translate="no"><a href="https://fedi.omada.cafe/@fluffery" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fluffery</span></a></span> <span class="h-card" translate="no"><a href="https://chaos.social/@maumau" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>maumau</span></a></span> <span class="h-card" translate="no"><a href="https://social.tchncs.de/@BryanGreyson" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BryanGreyson</span></a></span> <span class="h-card" translate="no"><a href="https://mas.to/@fairphone" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fairphone</span></a></span> I.e. <span class="h-card" translate="no"><a href="https://mstdn.social/@BrodieOnLinux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BrodieOnLinux</span></a></span> could not use any of those because they don't support <a href="https://infosec.space/tags/VoLTE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VoLTE</span></a> (not just in <a href="https://infosec.space/tags/Australia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Australia</span></a>) and thus would be blocked by the <a href="https://infosec.space/tags/IMEI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IMEI</span></a>-<a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a>!<br><a href="https://www.youtube.com/watch?v=zIJavqEzEIw" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=zIJavqEzEIw</span><span class="invisible"></span></a></p>
Linuxiac<p>IPFire 2.29 Core Update 195 open-source firewall is out, adding long-awaited WireGuard VPN support and easy-to-configure tunneling options.<br><a href="https://linuxiac.com/ipfire-2-29-core-update-195-firewall-brings-native-wireguard-support/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxiac.com/ipfire-2-29-core-</span><span class="invisible">update-195-firewall-brings-native-wireguard-support/</span></a></p><p><a href="https://mastodon.social/tags/ipfire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipfire</span></a> <a href="https://mastodon.social/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a> <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://mastodon.social/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
B'ad Samurai 🐐<p>A list of 3rd party file mirrors you may not want users accessing.</p><p><a href="https://github.com/BadSamuraiDev/bs-lists/blob/main/file-mirrors.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/BadSamuraiDev/bs-li</span><span class="invisible">sts/blob/main/file-mirrors.txt</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/list" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>list</span></a> <a href="https://infosec.exchange/tags/firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firewall</span></a></p>