security-best-practices-for-packet
Differences
This shows you the differences between two versions of the page.
security-best-practices-for-packet [2024/11/28 03:16] – created kc2ihx | security-best-practices-for-packet [2024/11/28 17:22] (current) – [Network Security Best Practices for Packet Radio] kc2ihx | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Network Security Best Practices for Packet Radio ====== | + | ====== |
+ | //TODO: write more// | ||
This is our attempt to document best practices for securing your packet radio node. This is primarily concerned with network security in regards to connecting your packet node to the Internet or 44net, rather than over-the-air security. | This is our attempt to document best practices for securing your packet radio node. This is primarily concerned with network security in regards to connecting your packet node to the Internet or 44net, rather than over-the-air security. | ||
security-best-practices-for-packet.1732763819.txt.gz · Last modified: 2024/11/28 03:16 by kc2ihx