Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Once this is over consider looking at network topology as a security mechnism in it's own right. Professionally I try operate a subnet hierarchy: public, intermediate, private where there's no routing information between public and private and private has no internet connectivity.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: