This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
I had a reader contact me with a question on using Kerberos and LDAP for authentication into Active Directory, based on Active Directory integration work I did many years ago. The issue was that he was experiencing a problem using native Kerberos authentication against Active Directory with SSH. Thanks Tomas!
A few months ago, I stumbled across a service called ODrive (“Oh” Drive) that allows you to combine multiple cloud storage services together. Since that time, I’ve been experimenting with ODrive, testing it to see how well it works, if at all, with my Fedora Linux environment.
Installing on linux. To download and extract the files, on a typical Unix/Linux command line, use. host => localhost, // Connection name/alias. // Omit USER:PASS@ if Mongo isnt configured to use authentication. Installing MongoDB. These are the very brief instructions and make some assumptions. Installing on windows.
Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.
By now you’ve heard the stories that Microsoft loves Linux and fully embraces the open-source world. Windows Subsystem for Linux (WSL). Contact them via email: linux@microsoft.com. The only requirement is a Linux VM. Cloud sandboxes are included with your Linux Academy subscription. Visual Studio Code.
Most aren’t the laptops, tablets, and phones we think of as using the internet: they’re appliances like routers, fridges, cameras, and a million others, each of which is equipped with storage space, an operating system, and a connection to the internet. All of which would be fine if the Internet of Things was secure, but it isn’t.
Erik Smith, notably known for his outstanding posts on storage and FCoE, takes a stab at describing some of the differences between SDN and network virtualization in this post. I came across this post on CloudFoundry’s User Account and Authentication Service (the UAA). Is Cisco’s Insieme effort producing a storage product?
Let’s start with passing some JSON data to a REST API to authenticate. Example 1: Authenticating to OpenStack. Let’s say you’re working with an OpenStack-based cloud, and you need to authenticate to OpenStack using OpenStack Identity (“Keystone”). Example 2: Authenticating to VMware NSX.
This November at Linux Academy, we have loads of new content coming your way! To all of our learners who may know someone who wants to learn more about the cloud or Linux, but they have been on the fence about signing up for a free community edition account, then tell them that right now is a great time for them to sign up!
We Azure, just like Microsoft Linux! Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications, check out this blog post if you’re wondering where to get started in Azure. Develop solutions that use storage tables. Develop solutions that use Cosmos DB storage.
Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications, check out this blog post if you’re wondering where to get started in Azure. As always, remember that you have a range of content available here at Linux Academy if you have any gaps in prerequisite knowledge.
This blending of “traditional” network engineering with containers, Linux, and DevOps tooling is how Matt is setting new trends and directions for the networking industry. Chris Wahl touches on the topic of using GitHub personal tokens to authenticate to HashiCorp Vault. Servers/Hardware. Nothing this time around.
Microsoft CTO Kevin Scott compared the company’s Copilot stack to the LAMP stack of Linux, Apache, MySQL and PHP, enabling organizations to build at scale on the internet, and there’s clear enterprise interest in building solutions with these services.
Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications, check out this blog post if you’re wondering where to get started in Azure. As always, remember that you have a range of content available here at Linux Academy if you have any gaps in prerequisite knowledge.
It’s available across iOS and Android; it has native desktop applications on Windows, macOS, and Linux; and it also integrates with every major browser including Chrome, Safari, Firefox, and Edge. You also have the option of protecting your Bitwarden account with two-factor authentication to provide an extra layer of security.
Christian Kellner provides a brief reminder that not all USB-C ports are Thunderbolt ports, and updates everyone on the status of bolt (Linux utility for working with Thunderbolt ports and peripherals). J Metz has launched his own, storage-focused “Short Takes” series; the first of these is found here. Virtualization.
Cumulus VX, if you aren’t aware, is a community-supported virtual appliance version of Cumulus Linux aimed at helping folks preview and test “full-blown” Cumulus Linux (which, of course, requires compatible hardware). In case you’re interested, here’s a collection of storage trends and predictions for 2016. Servers/Hardware.
Gopal now takes over and moves the discussion into storage in OpenStack. With regard to block storage via Cinder, Intel has incorporated support to filter volumes based on availability zone, capabilities, capacity, and other features so that volumes are allocated more intelligently based on workload and type of service required.
You will be able to create routes that map to multiple disparate backends, define & apply authentication and authorization to routes, set up rate limiting, and use custom domains to route requests to the APIs. You can now easily use Integrated Windows Authentication with your Windows containers on ECS to secure services.
Docker Hub will offer a registry for a comprehensive list of “Dockerized” applications (taking the place of the Docker Index, I assume), along with a management console, user authentication, an automated build service, the Docker Hub API, and collaboration tools to help users manage and share applications. Docker Making Its Move.
Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Apparently Dell’s new docking stations support firmware updates via Linux. This article has good information on safely using /tmp and /var/tmp on systemd-powered Linux distributions. Networking. Servers/Hardware.
Redpill Linpro talks to readers about their new routers running Cumulus Linux. Colleague and teammate Eric Shanks takes readers through what’s necessary to do Active Directory authentication for Kubernetes clusters. I need to move it back to Windows from Linux. That’s cool. Servers/Hardware. Don’t ask.).
Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). Michael Gasch shares his tmux setup. Career/Soft Skills.
Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. For relevant storage news, I’d recommend having a look at J Metz’ Storage Short Take 42. This will become even more useful, in my opinion, when Linux support is added. Virtualization.
Cumulus VX, if you aren’t aware, is a community-supported virtual appliance version of Cumulus Linux aimed at helping folks preview and test “full-blown” Cumulus Linux (which, of course, requires compatible hardware). In case you’re interested, here’s a collection of storage trends and predictions for 2016. Servers/Hardware.
Mike Foley recently published a two-part series on two factor authentication (2FA) for vSphere ( part 1 is here ; part 2 is here ). This Yelp Engineering blog post talks about one of these unintended side effects (processes running as PID 1 are treated differently by the Linux kernel). Cloud Computing/Cloud Management. Ubuntu 16.04
Security Jeff Warren discusses a potential way for malicious players to bypass multi-factor authentication, aka the “Pass the Cookie” attack. Diego Crespo talks about PowerShell on Linux and his experience with it. Storage This is a good (albeit slightly dated) overview of EBS volume types.
Over the last few weeks, I’ve been collecting articles I wanted to share with readers on major areas in technology: networking, security, storage, virtualization, cloud computing, and OSes/applications. Lee Briggs covers the plethora of ways to authenticate to AWS. Welcome to Technology Short Take #165!
VyOS is an open source Linux-based network operating system.). Part 1 covers auto-unsealing Vault ; part 2 covers authenticating to Vault using instance metadata ; and part 3 discusses authenticating to Vault using an IAM user or role. Go check out part 2. Paul Fitzgerald shows how to use Hyper-V and Docker to build a VyOS 1.2.0
If you’re unfamiliar with public key infrastructure (PKI), digital certificates, or encryption, you may find this Linux Journal article helpful. Lennart Koopmann provides a guide to Yubikey authentication in the real world. That’s good—the butterfly keyboards are awful (in my opinion). It provides the basics behind X.509v3
I’m assuming that you’ve already gone through the process of getting KVM installed on your Linux host; if you need help with that, a quick Google search should turn up plenty of “how to” articles (it’s basically a sudo apt-get install kvm operation). Next, you need to authenticate the hypervisor to NVP.
Flavio Leitner has a nice article comparing OVS internal ports with Linux veth devices. This topic is the subject of some debate given that some claim OVS internal ports perform much better than Linux veth devices. Eric Gray has a nice write-up on using Lightwave for authentication with Photon. Get all the details here.
This service holds metadata about the currently running virtual machine instance, such as storage, network configuration and more. Vamosi: IPTables is a way to configure the IP packet filter rules of the Linux kernel firewall. So before they elevated their privileges they couldn’t see iIMDS. Why might that be the case?
The fleetctl doesn’t expose any options to configure the SSH connection, and it assumes you’ll be using public key authentication. OS X provides an SSH agent by default, but on Linux systems you will probably have to manually run an SSH agent and add the appropriate SSH key: eval `ssh-agent -s` ssh-add ~/.ssh/keyfile.pem.
The platform offers versatile applications, including the verification of credentials like diplomas, establishing authentic origins to combat the online trade of counterfeit luxury goods, and supporting stakeholders throughout the entire food production chain, spanning from farmers to retailers.
In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.
In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.
And if you could initiate a heartbeat before authentication was complete on the site, you could smash and grab the encrypted information before anyone even knew who you were. And then there are, for example, dedicated Linux distributions which server like on collections of tools ready to be used. Kaksonen: Please do not.
And if you could initiate a heartbeat before authentication was complete on the site, you could smash and grab the encrypted information before anyone even knew who you were. And then there are, for example, dedicated Linux distributions which server like on collections of tools ready to be used. Kaksonen: Please do not.
And if you could initiate a heartbeat before authentication was complete on the site, you could smash and grab the encrypted information before anyone even knew who you were. And then there are, for example, dedicated Linux distributions which server like on collections of tools ready to be used. Kaksonen: Please do not.
Milind Gunjan shares some tips for troubleshooting Linux bridged networking on a KVM host. Many organizations prefer to use two-factor authentication (2FA) to help protect their systems. Via Ivan Pepelnjak’s site, Albert Siersema shares some information on using Ansible to automate 802.1x configurations. Servers/Hardware.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content