Parts of a network you should know about

If you’re running infrastructure and applications on AWS then you will encounter all of these things. They’re not the only parts of a network setup but they are, in my experience, the most important ones.

The start of Graham Lyons’ introduction to networking on AWS, which (though the terms may change) is a pretty good primer for networking in any cloud environment. Though cloud infrastructure providers have to deal with things at a different later, Graham’s post covers the basics—VPCs, subnets, availability zones, routing tables, gateways, and security groups—that customers need to manage when assembling their applications.

SSH Tunneling Examples

Most of my work is available publicly, but some development is hosted on a private SVN that’s hidden behind a firewall. Unfortunately, my primary development server is on the wrong side of that particular firewall, so I use the following command to bridge the gap: ssh -R 1980:svn_host:80 That creates a reverse tunnel through […] » about 200 words

[Insert Word Here] Is Hurting Your Network

Corporate networks are defenseless against the growing threat from instant messaging, and the government warns WiFi is insecure and easily sniffed.

Experts suggest we take precautions against the growing risk of p2p software that’s exposing sensitive documents and threatening national security.

Businesses blame security problems on their employees, their mobile devices, and other consumer technologies.

And now we have MySpace.

Rocking Wirelessly: Verizon’s V640 EVDO Card

After <a href="">vacillating for a while</a> (and <a href="">waiting for it to become available</a>), I finally purchased one of the <a href="">Verizon</a> / <a href="">Novatel V640</a> <a href="">Express Card</a> <a href="">EVDO</a> adapters that <a href="">everybody's talking about</a> for my <img border=0 width=1 height=1 src="" /><a href="">MacBook Pro</a>. » about 300 words