<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>KrnlPanic's Linux Notes and Tips</provider_name><provider_url>https://krnlpanic.com/wp</provider_url><author_name>krnlpanic</author_name><author_url>https://krnlpanic.com/wp/author/krnlpanic/</author_url><title>How to Use IPTables - KrnlPanic's Linux Notes and Tips</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="4JaaoD4F3Y"&gt;&lt;a href="https://krnlpanic.com/wp/how-to-use-iptables/"&gt;How to Use IPTables&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://krnlpanic.com/wp/how-to-use-iptables/embed/#?secret=4JaaoD4F3Y" width="600" height="338" title="&#x201C;How to Use IPTables&#x201D; &#x2014; KrnlPanic's Linux Notes and Tips" data-secret="4JaaoD4F3Y" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://krnlpanic.com/wp/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>IPTABLES TUTORIAL / HOWTO I. Definitions and similarities to ipchains II. Chain types and options III. Command pharmacy no prescription line examples With the release of the 2.4 kernel, everyone who was used to using ipchains to configure their firewall &hellip; Read more &raquo;</description></oembed>
