Tired of paying for a commercial VPN? I set up a private WireGuard VPN server, running in a Docker container on a cheap virtual machine I already have with Linode. No need to pay for additional infrastructure! It works straight out of the box, and is fast and simple to set up. This article closes a few gaps in the documentation that might slow you down. Set up time was about 10 minutes, including configuring client devices. It's a nice facility to have, and is so lightweight you can run it on existing infrastructure without paying anything more.
]]>Not recommended. The marketing materials lean heavily on its ‘advanced security features’, but TLDR it doesn’t have any, unless you think VPN capability is something special. It’s just a small, portable wireless router that can accept a WIFI signal as its WAN input. So you can use it in a coffee shop and have a firewall between you and their network, but the firewall is just like any other home router firewall. You can forward ports and so on, but that’s about it, and it doesn’t provide any visibility into the traffic or what’s going on. Sadly, it does not support DFS channels (52-140) on fast 5GHz WIFI, so it is not compatible with any access point using them.
]]>Recommended. The Firewalla Purple brings firewall management to the masses: It has a great GUI that makes it easy for less-technical users to see what is happening on your network and to manage devices. Firewall rules are easy to set up and content filtering policies can be toggled on and off by device or group. There are a few minor shortcomings but the feature set is still being extended. The Purple is an excellent device for managing small networks and the online activities of children. However, it is highly overpriced.
]]>Tuskfish 2.0.4 brings a user management module, which allows you to enrol trusted users in an Editorial role, so that they can create and edit content. The core structure has been refactored to improve modularity for development of new extensions. Internal login checks now test admin status against a surrogate password hash, rather than a simple session flag, which is a small security improvement: If an admin/editor changes their password at any time, any existing logged-in sessions are rendered invalid.
A maintenance release. Further internal refactoring to improve the structure and extensibility, and updates to third party libraries. An XSS vulnerability present in Bootstrap 4.0 has been patched through an update to Bootstrap V4.1.3.
Changelog: