The co-op bookstore for avid readers
Book Cover for: Safer @ Home with pfSense(R), Michael Lines

Safer @ Home with pfSense(R)

Michael Lines

You no longer need to risk your security and privacy on consumer-grade security products.

Book Description
pfSense(R) is a powerful, commercial-grade firewall that provides capabilities far beyond what you can get in consumer products. This book will walk you through setting up your pfSense(R) firewall with many easy-to-follow recipes, depending on your needs.

What you will learn
* Blocking malware, phishing and malicious sites and countries
* Hiding your DNS traffic from ISP snooping
* Reducing the burden that advertising has on your browsing
* Isolating your vulnerable IoT devices using VLANs
* Setting up your firewall to provide you with reports on matters that need your attention
* Resolving buffer bloat to maximize your internet connection
* Enabling remote access using VPNs
* Managing, documenting, updating and backing up your firewall configuration

Who this book is for
This book is for those with an introductory understanding of networking, at least networking terms like subnets. Prior knowledge of firewalls would be helpful but is not required. Most important is a desire and willingness to "get your hands dirty", both setting up your firewall and understanding how to utilize it to protect your home and business.

Book Details

  • Publisher: Michael Lines
  • Publish Date: Aug 30th, 2024
  • Pages: 108
  • Language: English
  • Edition: undefined - undefined
  • Dimensions: 9.00in - 6.00in - 0.22in - 0.34lb
  • EAN: 9781964431055
  • Categories: Security - Network SecurityNetworking - General

About the Author

Lines, Michael: -

Michael is an information security/risk executive and consultant, with a 20-year track record as a Chief Information Security Officer (CISO), advisory Information Security practice leader, and information security/risk consultant. He writes, blogs, presents, speaks, and provides interviews on a wide variety of information security topics, primarily concerning what it takes to develop and run effective information security programs, and why so many companies continue to suffer security breaches due to ineffective programs.