Österreich - Kennzeichen Österreich

Incoterms:DDP
Alle Preise sind inklusive Zoll und Gebühren bei der Auswahl der Versandart.

Bitte bestätigen Sie Ihre Währungsauswahl:

Euro
Versand ist kostenfrei bei den meisten Bestellungen über € 50 (EUR)

US Dollar
Versand ist kostenfrei bei den meisten Bestellungen über $60 (USD)

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


Jeff Fellinge has over 25 years’ experience in a variety of disciplines ranging from Mechanical Engineering to Information Security. Jeff led information security programs for a large cloud provider to reduce risk and improve security control effectiveness at some of the world’s largest datacenters. He enjoys researching and evaluating technologies that improve business and infrastructure security and also owns and operates a small metal fabrication workshop. 


The Low Cost of Open-Source Firewall Uses Jeff Fellinge
Open-source firewalls from projects such as pfSense and home versions from the commercial vendor Sophos provide sophisticated features at minimal or no cost. These products go beyond simple network filtering to offer security solutions.

Windows Subsystem Boosts Linux 2.0 Jeff Fellinge
Windows Subsystem for Linux 2.0 advances Microsoft’s commitment to enhance interoperation with Linux environments with increased file system performance and better support for Linux system calls. WSL 2 promises to bring more Linux tools to your Windows workstation without having to spin up a separate virtual machine or remotely connect to another system.

Assessing Risk on Home Network Security Devices Jeff Fellinge
Many options are available today to protect your IoT and other smart devices. These devices monitor network usage, look for common misconfigurations, and alert you to possible vulnerabilities or activities that could allow an attacker into your home network and grant access to your sensitive data.

How to Increase Container Security Awareness Jeff Fellinge
Docker containers are increasingly the go-to technology for virtualized cloud deployments. Containers are more portable, easier to scale, and can be more secure than traditional virtual machines. But the tools and processes to secure and manage these new technologies must also be container aware or you could have gaps in your defenses.

Steps to Fortifying Your Home Security Jeff Fellinge
With the proliferation of IoT devices, more connected homes, and increasingly savvy attacks, it’s more important than ever to configure the broadband router or modem that connects your home to the internet appropriately.

Use Osquery to Track System Inventory Data Jeff Fellinge
Knowing what you have is a critical first step to securing it. Explore osquery, an open-source package that provides endpoint visibility and is supported by an active open-source community. Osquery captures details of your inventory from operating system to processor and disk.

Eyes Up: Benefits of Centralized Logging Jeff Fellinge
Centralizing event data helps defenders run queries to spot anomalies, trends, and other phenomena otherwise not readily visible. The centralized logging of security events is a fundamental security control to help ensure attackers don’t go unnoticed.

SSH Part 3: Configuring SSH Reverse Tunnel to Reduce Exposed Ports Jeff Fellinge
You can use the Secure Shell (SSH) standard and tools for more than just secure remote administration. Learn how to use SSH port forwarding to securely connect to remote systems without exposing them to insecure networks.

SSH Part 2: Configuring SSH from a Windows 10 Workstation Jeff Fellinge
Microsoft’s support for the Windows Subsystem for Linux and the OpenSSH standard increases your options to manage Linux-based cloud environments and IoT devices. Use these tools to securely authenticate your devices and encrypt all communications.

SSH Part 1: Configuring SSH to Securely Connect to Remote Devices Jeff Fellinge
The Secure Shell (SSH) standard and tools provide essential command-line remote administration access for the secure and remote management of your IoT devices and cloud infrastructure. Learn how to configure SSH to securely connect to remote devices.

All Authors

Show More Show More
View Blogs by Date

Archives