{"id":214,"date":"2005-05-25T20:20:09","date_gmt":"2005-05-26T01:20:09","guid":{"rendered":"https:\/\/www.suramya.com\/blog\/2005\/05\/25\/tools-for-configuring-iptables\/"},"modified":"2022-06-16T15:17:55","modified_gmt":"2022-06-16T09:47:55","slug":"tools-for-configuring-iptables","status":"publish","type":"post","link":"https:\/\/www.suramya.com\/blog\/2005\/05\/tools-for-configuring-iptables\/","title":{"rendered":"Tools for configuring iptables"},"content":{"rendered":"\n<p>Configuring firewalls is not easy if you don&#8217;t know what you are doing and most of us don&#8217;t have the time of the paitience to spend hours figuring out internet security. But having a badly configured firewall is worse than having no firewall &#8217;cause it gives you a false sense of security. <\/p>\n<p>Thankfully there are tools out there that allow you to configure a decent firewall without needing a degree in rocket science. Chris Lynch has written an article on Newsforge which looks at <a href='http:\/\/software.newsforge.com\/article.pl?sid=05\/05\/09\/1846213'>Three tools to help you configure iptables<\/a>.<\/p>\n<p>Check it out.<\/p>\n<p>&#8211; Suramya<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Configuring firewalls is not easy if you don&#8217;t know what you are doing and most of us don&#8217;t have the time of the paitience to spend hours figuring out internet security. But having a badly configured firewall is worse than having no firewall &#8217;cause it gives you a false sense of security. Thankfully there are [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[19,20,17,2],"tags":[],"class_list":["post-214","post","type-post","status-publish","format-standard","hentry","category-computer-security","category-security-toolsapps","category-security-tutorials","category-techie-stuff"],"_links":{"self":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/comments?post=214"}],"version-history":[{"count":1,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/214\/revisions"}],"predecessor-version":[{"id":5029,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/214\/revisions\/5029"}],"wp:attachment":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/media?parent=214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/categories?post=214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/tags?post=214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}