Remove page j
article thumbnail

Technology Short Take 158

Scott Lowe

DNS, BGP, hardware-based security, Kubernetes, Linux—they’re all in here. See this page for instructions on how to enable BBR on Debian 10. A “highly evasive” Linux malware named OrBit has emerged; see here for more details. Hopefully I’ve managed to find something useful for someone. Networking.

Linux 90
article thumbnail

Technology Short Take 153

Scott Lowe

Although Linux is often considered to be superior to Windows and macOS with regard to security, it is not without its own security flaws. I, personally, would posit that Linux can be more secure than other platforms, but it requires proper configuration and can still be undone by a loose nut behind the keyboard. Virtualization.

Linux 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #87

Scott Lowe

Vincent Bernat has a really in-depth article on IPv4 route lookup on Linux (and one on IPv6 route lookup as well). Andrew Montalenti discusses the state of Linux on the desktop by examining his own journey with various Lenovo-branded laptops. Here’s hoping you find something useful! Networking.

Storage 60
article thumbnail

Technology Short Take #47

Scott Lowe

Michael Webster isn’t a name that normally pops up here in the Networking section of my Technology Short Takes, but he recently wrote an article on installing Cumulus Linux from a MacBook Pro that I thought might be handy. Open Network Linux (main website here ; GitHub repo here ) was recently brought to my attention. Servers/Hardware.

Linux 60