Remove Guidelines Remove Open Source Remove Operating Systems
article thumbnail

Securing Linux Policy

Tech Republic Security

Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades. This policy from TechRepublic Premium provides guidelines for securing Linux on company computers and computers used to conduct company business. From the policy: DEVELOP TEMPLATES BASED ON.

Linux 419
article thumbnail

what every open source project needs

SPF13

In the last few years open source has transformed the software industry. From Android to Wikipedia, open source is everywhere, but how does one succeed in it? What Every Successful Open Source Project Needs. spf13 Chief Operator @ Docker? Open Source is taking over the world. Transcript.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using EncFS with Dropbox and BoxCryptor

Scott Lowe

To help address that, I looked around to find an open, interoperable way of adding an extra layer of encryption onto my data. What I found is described in this post, and it involves using the open source EncFS and OSXFUSE projects along with an application from BoxCryptor to provide real-time, client-side AES-256 encryption.

article thumbnail

Using Puppet for Account Management

Scott Lowe

It’s been over four months since my last post on open source Puppet , when I posted some updated multi-OS Puppet configurations. As such, we’ll want to follow Puppet’s guidelines for module structures. Using Puppet with Multiple Operating Systems. Modifying Virtual User Resources in Puppet.

article thumbnail

Technology Short Take 145

Scott Lowe

Well, let’s see…stuff on Envoy, network automation, network designs, M1 chips (and potential open source variants!), Are open source M1-style chips a possibility? Operating Systems/Applications. Welcome to Technology Short Take #145! What will you find in this Tech Short Take? Thank you, Ben!

article thumbnail

Technology Short Take 151

Scott Lowe

The story of a developer deliberately polluting their open source projects—as outlined here for the “colors.js” Via the Kubernetes blog, Rory McCune of Aqua Security provides some guidelines for securing admission controllers. Operating Systems/Applications. ” and “faker.js”

article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Operating System & Software Blogs. TechWorld – Operating Systems. CIO Dashboard. The Next Web.

Resources 107