This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Its commitment to Linux turned what might have been a Windows Server-based cloud computing backwater into the Microsoft Azure powerhouse, the only public cloud to give the AWS juggernaut a serious run for its money. Since Satya Nadella took the helm in 2014, Microsoft has doubled down on its support for non-Microsoft technologies.
Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.
That means features like BitLocker encryption or Windows Hello authentication will transition over to using Pluton in the future. You’ll still be able to build custom PCs with Pluton chips embedded inside, and there should even be support for Linux in the future, too. so you just get it.”
Most aren’t the laptops, tablets, and phones we think of as using the internet: they’re appliances like routers, fridges, cameras, and a million others, each of which is equipped with storage space, an operatingsystem, and a connection to the internet. All of which would be fine if the Internet of Things was secure, but it isn’t.
This included installing operatingsystem updates, NTP servers, DNS servers, static IPs, audit log options, anti-virus, etc. For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. Network Device Configurations.
On March 14, 2025, a root certificate essential for verifying signed content and add-ons for Firefox and other Mozilla projects expired, necessitating an update to version 128 (or ESR 115.13+) to avoid disruptions across all platforms, including Linux, MacOS, Windows, Android, and iOS.
A great analogy here is what we’ve seen in operatingsystems. But we also had Linux, which the open-source movement championed. So I hope that we will have a Linux of language models, a Linux of AI. … In addition, we do need watermarking, authentication, provenance, so we know where things come from.
I came across this post on CloudFoundry’s User Account and Authentication Service (the UAA). OperatingSystems/Applications. Only a true geek would be interested in this, but here’s some information on running OpenBSD in KVM on Linux. Cloud Computing/Cloud Management. Definitely worth reading, in my view.
Our top pick is free to use across a range of operatingsystems on mobile and desktop. It’s available across iOS and Android; it has native desktop applications on Windows, macOS, and Linux; and it also integrates with every major browser including Chrome, Safari, Firefox, and Edge. Image: Bitwarden.
This blending of “traditional” network engineering with containers, Linux, and DevOps tooling is how Matt is setting new trends and directions for the networking industry. Chris Wahl touches on the topic of using GitHub personal tokens to authenticate to HashiCorp Vault. OperatingSystems/Applications.
The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. OperatingSystems/Applications. Ryan Blunden has authored a fairly comprehensive piece on environment variables in Linux and macOS. Linux may be coming to the Apple M1 chip.
Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Apparently Dell’s new docking stations support firmware updates via Linux. OperatingSystems/Applications. Cindy Sridharan has a good article on health checks and graceful degradation in distributed systems.
Christian Kellner provides a brief reminder that not all USB-C ports are Thunderbolt ports, and updates everyone on the status of bolt (Linux utility for working with Thunderbolt ports and peripherals). OperatingSystems/Applications. Highly recommended reading. Cloud Computing/Cloud Management. A simple tip, yes, but useful!
Lee Briggs covers the plethora of ways to authenticate to AWS. OperatingSystems/Applications I don’t do a whole lot in application development (yet), but the idea of declarative database schemas is a pretty cool idea. I found these two posts on structuring your repositories for GitOps to be very helpful.
William Lam shares news about higher-capacity SODIMMs available for small or ultra small form factor systems. Security Jeff Warren discusses a potential way for malicious players to bypass multi-factor authentication, aka the “Pass the Cookie” attack. Diego Crespo talks about PowerShell on Linux and his experience with it.
Redpill Linpro talks to readers about their new routers running Cumulus Linux. Colleague and teammate Eric Shanks takes readers through what’s necessary to do Active Directory authentication for Kubernetes clusters. OperatingSystems/Applications. I need to move it back to Windows from Linux.
Vulnerabilities at the operatingsystem level may be exploited by rogue container workloads if not hardened. RBAC (Role Based access Control) has become a standard for the Kubernetes Authentication-Authorization-Admission security paradigm. Implement RBAC.
Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). OperatingSystems/Applications.
Modern-day defense in depth strategies revolve around this same concept of making an attacker go through multiple layers of defense, with one key difference: we’re applying that to our computer systems. Identity is the process of assigning each individual user and system their own unique name. Domain 7: Physical Security.
Welcome to Technology Short Take #51, another collection of posts and links about key data center technologies like networking, virtualization, cloud management, and applications/operatingsystems. Here’s one way , using Ravello Systems. Flavio Leitner has a nice article comparing OVS internal ports with Linux veth devices.
Hykes talks about the second challenge to moving into production securely: the diversity of infrastructure and operatingsystems (OSes) underneath Docker. This led Docker to work with a number of other companies to build a secure, lean, portable Linux subsystem. LinuxKit is a lean, portable, and secure Linux subsystem.
Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. OperatingSystems/Applications. This will become even more useful, in my opinion, when Linux support is added. Viktor van den Berg shares his CKAD exam experience and some tips on how to prepare.
Mike Foley recently published a two-part series on two factor authentication (2FA) for vSphere ( part 1 is here ; part 2 is here ). OperatingSystems/Applications. This Yelp Engineering blog post talks about one of these unintended side effects (processes running as PID 1 are treated differently by the Linux kernel).
Cumulus VX, if you aren’t aware, is a community-supported virtual appliance version of Cumulus Linux aimed at helping folks preview and test “full-blown” Cumulus Linux (which, of course, requires compatible hardware). OperatingSystems/Applications. Good stuff Juan!
If you’re unfamiliar with public key infrastructure (PKI), digital certificates, or encryption, you may find this Linux Journal article helpful. Lennart Koopmann provides a guide to Yubikey authentication in the real world. OperatingSystems/Applications. It provides the basics behind X.509v3
Via Ivan Pepelnjak, I was pointed to Jon Langemak’s in-depth discussion of working with Linux VRFs. Sonia Cuff provides a set of links for detailed instructions on setting up VPN access from macOS to Microsoft Azure with Azure Active Directory authentication. OperatingSystems/Applications. Networking.
Cumulus VX, if you aren’t aware, is a community-supported virtual appliance version of Cumulus Linux aimed at helping folks preview and test “full-blown” Cumulus Linux (which, of course, requires compatible hardware). OperatingSystems/Applications. Good stuff Juan!
TeamViewer allows users to securely connect to devices from any location, boasting multi-platform support for seamless connections across various operatingsystems. It also offers security features, like two-factor authentication and stringent access controls, to ensure that only authorized individuals can access remote devices.
Vamosi: IPTables is a way to configure the IP packet filter rules of the Linux kernel firewall. Their OperatingSystem type was set to windows. This was strange since they were obviously running linux commands in a linux terminal so why is it set to windows? Vamosi: They noticed another interesting thing here.
So we include other telemetry that seeks to authenticate that the entity logging in is who they say they are. Without a basic ability to authenticate these characters, there’d be no drama, no romance, no tragedy. So that’s why you need multi factor authentication. Think about it. And important.
You know with modern vehicles, they're actually becoming like they're running on bluetooth, they're running the Android operatingsystem. Vamosi: What unites these microcontrollers is not an operatingsystem, rather it's a bus. A bus is a communication system that transfers data between components. What's that?
In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.
In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.
They contain an operatingsystem and they have confirmation for RAM and other hardware you may want to simulate. Knudsen: Normally I would use virtual machines for this, I go install Linux and install the other stuff and work away at the command line until I got to where I wanted it to be.
VyOS is an open source Linux-based network operatingsystem.). Part 1 covers auto-unsealing Vault ; part 2 covers authenticating to Vault using instance metadata ; and part 3 discusses authenticating to Vault using an IAM user or role. OperatingSystems/Applications. Go check out part 2.
You’ll want someone with years of pen testing experience, some one who knows the operatingsystem like no other. So in general, an operatingsystem that eventually allows you to gain more information about the context within which attack was made. Maybe your first concern is to make sure the company is functional.
Milind Gunjan shares some tips for troubleshooting Linux bridged networking on a KVM host. Many organizations prefer to use two-factor authentication (2FA) to help protect their systems. ” OperatingSystems/Applications. configurations. Servers/Hardware. Nothing this time around!
At the time of this podcast, Lockbit accounts for 40% of the ransomware present today and it hits both Windows and Linux machines. If I'm constantly if I'm being asked for a second factor of authentication, as long as that's secure, and I think hardware token is the way to go. --[Music] --. Definitely prevent that login.
Living off the Land (LoL) is an attack where files already on your machine, ie your operatingsystem, are used against you. So I started thinking about other ways to hide messages or even how to get malware onto a system without it being detected. Like all the unused files within your operatingsystem?
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content