This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
I had a reader contact me with a question on using Kerberos and LDAP for authentication into Active Directory, based on Active Directory integration work I did many years ago. The issue was that he was experiencing a problem using native Kerberos authentication against Active Directory with SSH. Thanks Tomas!
Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.
By now you’ve heard the stories that Microsoft loves Linux and fully embraces the open-source world. Windows Subsystem for Linux (WSL). Contact them via email: linux@microsoft.com. The only requirement is a Linux VM. Cloud sandboxes are included with your Linux Academy subscription. Visual Studio Code.
You can set up and package everything that you need into an application, and execute that package without the virtual machine overhead that is normally rendered during that process. A pod is a group of containers that are put together as a group on the same node (virtual machine) and are designed specifically for easy communication.
Let’s start with passing some JSON data to a REST API to authenticate. Example 1: Authenticating to OpenStack. Let’s say you’re working with an OpenStack-based cloud, and you need to authenticate to OpenStack using OpenStack Identity (“Keystone”). Example 2: Authenticating to VMware NSX.
Erik Smith, notably known for his outstanding posts on storage and FCoE, takes a stab at describing some of the differences between SDN and network virtualization in this post. I came across this post on CloudFoundry’s User Account and Authentication Service (the UAA). Virtualization. Cloud Computing/Cloud Management.
For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. I understand not everyone “builds” workstations and servers, as many organizations use imaging and virtual templates. Network Device Configurations. We need to disable silly protocols, such as “finger.”
We Azure, just like Microsoft Linux! Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications, check out this blog post if you’re wondering where to get started in Azure. Implement authentication. Review migration strategies for Hyper-V virtual machines.
BlackMatter actors use a separate encryption binary for Linux-based machines and routinely encrypt ESXI virtual machines. Go a step further by regularly updating your passwords and enabling multi-factor authentication (MFA). BlackMatter then remotely encrypts the hosts and shared drives as they are found,” reads the statement.
Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications, check out this blog post if you’re wondering where to get started in Azure. As always, remember that you have a range of content available here at Linux Academy if you have any gaps in prerequisite knowledge.
Mozilla moves towards multi-factor authentication. In an article reported earlier by SecureWorld News, we covered Microsoft's new "passwordless" technology , which is actually multi-factor authentication (MFA). Now, we need to incorporate something called authentication that integrates with access on the other side.
This user will be used to authenticate to the other cluster nodes and to perform actions on the cluster: sudo passwd hacluster. On node1 , authenticate as the hacluster user: sudo pcs cluster auth NODE1 NODE2. The post Configure a Failover Cluster with Pacemaker appeared first on Linux Academy Blog.
This blending of “traditional” network engineering with containers, Linux, and DevOps tooling is how Matt is setting new trends and directions for the networking industry. Chris Wahl touches on the topic of using GitHub personal tokens to authenticate to HashiCorp Vault. Virtualization. Servers/Hardware.
Docker Hub will offer a registry for a comprehensive list of “Dockerized” applications (taking the place of the Docker Index, I assume), along with a management console, user authentication, an automated build service, the Docker Hub API, and collaboration tools to help users manage and share applications. Docker Making Its Move.
In this post, I’ll show you how to use Docker Machine with KVM and Libvirt on a Linux host (I’m using Fedora 27 as an example). Note that if your user account isn’t a member of the “libvirt” group, you’ll get prompted for authentication for most every docker-machine command, even just listing machines.).
Kubernetes nodes rely on underlying virtual servers for both the master control plane and for worker nodes. It is important to use security tooling such as OpenSCAP, the open source version of the Security Content Automation Protocol, to harden virtual machine images prior to their deployment in virtual private clouds.
Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. network virtualization). Is the relationship between network virtualization and service mesh closer than some folks might wish to admit? Virtualization. Servers/Hardware. Career/Soft Skills.
Christian Kellner provides a brief reminder that not all USB-C ports are Thunderbolt ports, and updates everyone on the status of bolt (Linux utility for working with Thunderbolt ports and peripherals). Virtualization. Highly recommended reading. Cloud Computing/Cloud Management.
Virtually every industry, from healthcare to banking and everything in between, has rules for how businesses handle data. The Linux Audit system is a great solution. Finally, use the Pluggable Authentication Module (PAM) to set password requirements and lock out users with too many failed logins. Disk Encryption.
Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Apparently Dell’s new docking stations support firmware updates via Linux. This article has good information on safely using /tmp and /var/tmp on systemd-powered Linux distributions. Virtualization. Networking.
Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications, check out this blog post if you’re wondering where to get started in Azure. As always, remember that you have a range of content available here at Linux Academy if you have any gaps in prerequisite knowledge.
Redpill Linpro talks to readers about their new routers running Cumulus Linux. Chip Zoller makes the argument in favor of running Kubernetes in/on virtual machines. Colleague and teammate Eric Shanks takes readers through what’s necessary to do Active Directory authentication for Kubernetes clusters. Virtualization.
Security Jeff Warren discusses a potential way for malicious players to bypass multi-factor authentication, aka the “Pass the Cookie” attack. Diego Crespo talks about PowerShell on Linux and his experience with it. Virtualization Frank Denneman discusses simulating NUMA nodes for nested ESXi virtual appliances.
Cumulus VX, if you aren’t aware, is a community-supported virtual appliance version of Cumulus Linux aimed at helping folks preview and test “full-blown” Cumulus Linux (which, of course, requires compatible hardware). Virtualization. Have I mentioned the ESXi Virtual Appliance ? Good stuff Juan!
Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). Virtualization.
Welcome to Technology Short Take #51, another collection of posts and links about key data center technologies like networking, virtualization, cloud management, and applications/operating systems. I’m pretty sure I’ve mentioned Open Virtual Network (OVN) here before, as I’m pretty jazzed about the work going on with this project.
To access these sections of the building, there have to be doors, too, and behind these doors are the various companies, the various cloud clients with all their various virtual machines that can be spun up or spun down. You simply send an HTTP request and retrieve unique information per Virtual Machine (VM). You don't have to.
Mike Foley recently published a two-part series on two factor authentication (2FA) for vSphere ( part 1 is here ; part 2 is here ). This Yelp Engineering blog post talks about one of these unintended side effects (processes running as PID 1 are treated differently by the Linux kernel). Virtualization. Ubuntu 16.04
Over the last few weeks, I’ve been collecting articles I wanted to share with readers on major areas in technology: networking, security, storage, virtualization, cloud computing, and OSes/applications. Lee Briggs covers the plethora of ways to authenticate to AWS. Welcome to Technology Short Take #165!
Cumulus VX, if you aren’t aware, is a community-supported virtual appliance version of Cumulus Linux aimed at helping folks preview and test “full-blown” Cumulus Linux (which, of course, requires compatible hardware). Virtualization. Have I mentioned the ESXi Virtual Appliance ? Good stuff Juan!
I’m assuming that you’ve already gone through the process of getting KVM installed on your Linux host; if you need help with that, a quick Google search should turn up plenty of “how to” articles (it’s basically a sudo apt-get install kvm operation). Next, you need to authenticate the hypervisor to NVP.
Intel is now at 77% virtualized, with 80% of all new servers being deployed in the cloud. Visit the site for more information on virtualization, servers, storage, and other enterprise technologies. General Linux Networking Storage Virtualization Hardware IDF2013 OpenStack' It’s less than an hour to deploy instances.
This led Docker to work with a number of other companies to build a secure, lean, portable Linux subsystem. LinuxKit is a lean, portable, and secure Linux subsystem. Other companies involved in LinuxKit include IBM, Microsoft, Intel, Hewlett Packard Enterprise, and the Linux Foundation. The result of this effort is LinuxKit.
You’ll need Ansible installed on the system where you’ll be running Vagrant and the appropriate back-end virtualization platform (I tested this with VMware Fusion , but there’s nothing VMware-specific here). For example, I wanted to verify some of the facts that are gathered by Ansible across various Linux distributions.
If you’re unfamiliar with public key infrastructure (PKI), digital certificates, or encryption, you may find this Linux Journal article helpful. Lennart Koopmann provides a guide to Yubikey authentication in the real world. Virtualization. That’s good—the butterfly keyboards are awful (in my opinion).
Via Ivan Pepelnjak, I was pointed to Jon Langemak’s in-depth discussion of working with Linux VRFs. Sonia Cuff provides a set of links for detailed instructions on setting up VPN access from macOS to Microsoft Azure with Azure Active Directory authentication. Virtualization. I hope that you find something useful here.
Since that time, I’ve incorporated Linux ( Fedora , specifically) into my computing landscape, and I started using the Libvirt provider for Vagrant (see my write-up here ). each do |net| section works for the local virtualization providers (VirtualBox, VMware, and Libvirt), but is silently ignored for AWS. The machine[nics].each
The fleetctl doesn’t expose any options to configure the SSH connection, and it assumes you’ll be using public key authentication. OS X provides an SSH agent by default, but on Linux systems you will probably have to manually run an SSH agent and add the appropriate SSH key: eval `ssh-agent -s` ssh-add ~/.ssh/keyfile.pem.
Ethereum boasts a mature ecosystem of tools for writing smart contracts using the Solidity programming environment, which operates on the Ethereum Virtual Machine. As an initiative championed by the Linux Foundation, it was purpose-built with a focus on enterprise distributed ledger use cases.
Knudsen: What was cool was that containers are so much lighter than virtual machines. Vamosi: Virtual Machines are what just that; they’re software representations of hardware machines. This is how malware, for example, is analyzed; if the virtual machine gets infected and crashes, the physical machine isn’t impacted.
You can't run an operating system if you're running like even real time Linux, you probably couldn't do a very good job of activating the cylinders on your, on your engine controller so even an operating system, it has limitations and so why even bother. So we'll have a virtual CTF. Leale: they're way too slow to fire an engine.
And if you could initiate a heartbeat before authentication was complete on the site, you could smash and grab the encrypted information before anyone even knew who you were. You could use a Starbucks free wi-fi and virtually leave no trace behind. What do you want to do and you will find these tools and so on.
And if you could initiate a heartbeat before authentication was complete on the site, you could smash and grab the encrypted information before anyone even knew who you were. You could use a Starbucks free wi-fi and virtually leave no trace behind. What do you want to do and you will find these tools and so on.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content