I've worked in academia for a while and early in my 20+ year career I learned vi simply because it WAS on every *nix variant I touched; IRIX, Solaris, HP-UX, Linux, AIX and a couple others I can't remember the names of (DECs *nix's name escapes me, for instance). Most *nix servers didn't have a GUI (and in my opinion shouldn't have one; yeah, get off my lawn, blah, blah, blah) so vi was almost compulsory to know if you needed to do anything with a config or script file. I wouldn't say I am a master at vi by any means; still look up commands from time to time. I wouldn't try writing a journal article with it, but it is powerful and once you learn the basics you can edit just about anything with a
In GUI environments I try to use bare bones editors (sometimes literally) as the others just get in the way or like NotePad and WordPad screw up line feeds and other basic UTF formatting. I do like ones that highlight code in the GUI environment, but I only use those in conjunction with other GUI tools I use for web work. I am just not impressed by any of these new GUI editors, mostly because I do UI/UX design and they just suck from that standpoint. It's like all we learned about proper GUI design in the 1980s and 1990s was forgotten, or something and everyone wants to reinvent the wheel, badly. [shakes head and goes back to coding]
A list of recently purchased/downloaded or even new additions would cycle a larger group of useful apps to the app store audience.
New apps should be featured, not most popular or most sold. Right now there are an extremely limited number of ways to filter apps when you browse and this more than anything is hurting the smaller, startup app developers. I know, I've been one!
The key is to only ever run the services that are absolutely needed, carefully configure these and keep them up to date. If you follow that advice a firewall is an added level of security but not necessarily needed.
The main caveat or gotcha to that approach is the time between vulnerability discovery and patch. There are services that may also be a requisite to a mission critical service that have exposed ports without a firewall. These can create vulnerabilities without a firewall protecting them. Let's put it this way, there are A LOT more reasons to run a firewall than to not run one. It's always better to err on the side of caution/paranoia when it comes to net security.
As soon as they start handling credit card transactions, they will need to conform with PCI standards, which will mandate much much higher levels of protections. There are significant fines associated with non-compliance so you may want to forward them over information about this.
Very true and the changeover process for the required configuration is non-trivial as well. I remember when our organization met PCI compliance for CCs and it took months and lots of dollars to get all the systems that were processing credit cards up to spec. If they're going to do CC processing, even on an off chance, they should look into the requirements and do the setup that way NOW! It's more secure overall anyway so why not just do it from the ground up rather than trying to go through the Hell of modifying the setup for compliance later.
I've set up networks where the server infrastructure itself is on its own segment, so there's no need for firewalls between the servers themselves, but the whole subnet is firewalled by a border router.
Ask Target how well that scheme worked out from them.
It sounds a little like you're trying to just fling a firewall at the system and improve some sort of objective security metric.
What threats are you risks to mitigate with the firewall? What threats will it help guard against?
They don't come for free, and configuring them don't come for free.
What planet are you from? You don't setup a firewall to counter known threats. That's what software patches are for. You setup a firewall to prevent unknown threats on unused network ports. Just because you're not using a port doesn't mean there isn't a service attached to it that's vulnerable. That's why we have firewalls. And yes, firewalls do indeed come for free as part of most operating systems and network switch OSes and configuring them should take minutes for anyone with half a brain and some level of network admin competency. If in today's server admin world you take longer than a few minutes to setup the firewall as part of your config you've got a ridiculously complex set of services or you're in the wrong profession!
From its very beginning, quantum theory has been revealing extraordinary and counter-intuitive phenomena, such as wave-particle duality, Schrodinger cats and quantum non-locality. Another paradoxical phenomenon found within the framework of quantum mechanics is the ‘quantum Cheshire Cat’: if a quantum system is subject to a certain pre- and post-selection, it can behave as if a particle and its property are spatially separated. It has been suggested to employ weak measurements in order to explore the Cheshire Cat’s nature. Here we report an experiment in which we send neutrons through a perfect silicon crystal interferometer and perform weak measurements to probe the location of the particle and its magnetic moment. The experimental results suggest that the system behaves as if the neutrons go through one beam path, while their magnetic moment travels along the other.