Remove page j
article thumbnail

Technology Short Take 158

Scott Lowe

DNS, BGP, hardware-based security, Kubernetes, Linux—they’re all in here. See this page for instructions on how to enable BBR on Debian 10. Alex Neihaus provides readers with a walkthrough for adding BGP routes to AWS security groups. Operating Systems/Applications. Networking. Servers/Hardware.

Linux 90
article thumbnail

Technology Short Take 153

Scott Lowe

Although Linux is often considered to be superior to Windows and macOS with regard to security, it is not without its own security flaws. I, personally, would posit that Linux can be more secure than other platforms, but it requires proper configuration and can still be undone by a loose nut behind the keyboard. Virtualization.

Linux 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #87

Scott Lowe

Chris Binnie walks you through the process of using user namespaces to help secure your Docker hosts and containers. Virtue Security has some articles on AWS penetration testing: one on S3 buckets and one that also covers IAM and EC2. Operating Systems/Applications. Servers/Hardware. Cloud Computing/Cloud Management.

Storage 60
article thumbnail

Setting up Wireguard for AWS VPC Access

Scott Lowe

This page on the Wireguard site has full instructions for a variety of operating systems. Modify the security group(s) to allow UDP port 51280 to the instance(s) that will have defined Wireguard interfaces. PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE.

Linux 78
article thumbnail

Hard drive sanitization according to Dept. of Defense standards

Galido

If you use FDISK, FORMAT utilities, or the standard operating system DELETE command for data removal, there is always a chance to recover the deleted files (using undelete or unformat tools) which can be used against the owner’s will. Once a file is ‘Securely Deleted’ no one can undelete it. OnClick Utilities.

Media 72
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

While digital voting systems are more secure today, what about the larger ecosystem, starting from the moment you register until your vote is counted? Who’s keeping those systems secure? It also lead to even more testing of election system devices in other states.

System 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

While digital voting systems are more secure today, what about the larger ecosystem, starting from the moment you register until your vote is counted? Who’s keeping those systems secure? It also lead to even more testing of election system devices in other states.

System 52