Resources About Firewall Rules for Linux
@[email protected] Friday, 15th March 2021
An e-mail with an apparently harmless attachment. A link to a malicious website. A prepared zip archive with malware, or a payload embedded in a PDF document is all it takes to infiltrate a network.
Some years ago, I had an unfortunate incident, which led me to dig deeper in the subject to implement appropriate countermeasures.
It is by then that I have translated this Pocket Reference Guide from O'Reilly into Arabic.
You can access the book by clicking on the cover above.