Remove page j
article thumbnail

Technology Short Take 158

Scott Lowe

Networking. See this page for instructions on how to enable BBR on Debian 10. Operating Systems/Applications. For your fix of storage-related links, J Metz has relatively recently published Storage Short Take #47. DNS, BGP, hardware-based security, Kubernetes, Linux—they’re all in here. Programming.

Linux 90
article thumbnail

Technology Short Take 153

Scott Lowe

Networking. Want to understand kube-proxy , a key part of Kubernetes networking, a bit better? Operating Systems/Applications. Note that this page doesn’t seem to render properly in Firefox, although Chrome and Safari seem fine.). Nothing here this time around—maybe go check J Metz' blog instead ?

Linux 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #87

Scott Lowe

Networking. Ivan Pepelnjak has a great article that tries to get to the kernel of truth in the middle of the intent-based networking hype. The company is VirTool Networks (catchy, eh?), Joep Piscaer discusses his use of ProtonVPN as an always-on VPN for his home network. Operating Systems/Applications.

Storage 60
article thumbnail

Setting up Wireguard for AWS VPC Access

Scott Lowe

This page on the Wireguard site has full instructions for a variety of operating systems. If you want or need to use multiple Wireguard interfaces, you’ll need either separate network interfaces or use multiple ports. (You can also install the wireguard meta-package, if you’d prefer.) PrivateKey =.

Linux 78
article thumbnail

Technology Short Take #47

Scott Lowe

Networking. Michael Webster isn’t a name that normally pops up here in the Networking section of my Technology Short Takes, but he recently wrote an article on installing Cumulus Linux from a MacBook Pro that I thought might be handy. Jason Edelman has a great post on automated network diagrams with Schprokits and AutoNetkit.

Linux 60
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

It also lead to even more testing of election system devices in other states. One of the premiere security researchers that Bowen invited to California was J. He went on to review other voting systems, such as a new one being developed in the nation’s capital. There's lots of different ways any of this could be done.

System 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

It also lead to even more testing of election system devices in other states. One of the premiere security researchers that Bowen invited to California was J. He went on to review other voting systems, such as a new one being developed in the nation’s capital. There's lots of different ways any of this could be done.

System 52