Remove 2012 Remove Authentication Remove Malware Remove Storage
article thumbnail

Technology Short Take 176

Scott Lowe

Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Think Linux doesn’t have malware? And here’s another example of malware that is targeting Linux (along with Windows). Rory McCune explains Kubernetes authentication. Storage Gergely Imreh discusses ZFS on a Raspberry Pi.

Linux 112
article thumbnail

Barn Doors - A Screw's Loose

A Screw's Loose

They started at 64mb and today you can get a flash drive that has a terabyte of storage on it. Let’s build identification and authentication frameworks on which we can then base access to that data. ©2011-2012 A Screws Loose. What happened when you lost one of those? We care about that app or that device that the app runs on.

Mobile 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

Such a scenario isn’t fantasy; something like this actually existed between 2012 and 2014. And if you could initiate a heartbeat before authentication was complete on the site, you could smash and grab the encrypted information before anyone even knew who you were. I’m talking about Heartbleed or CVE 2014-0160.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

Such a scenario isn’t fantasy; something like this actually existed between 2012 and 2014. And if you could initiate a heartbeat before authentication was complete on the site, you could smash and grab the encrypted information before anyone even knew who you were. I’m talking about Heartbleed or CVE 2014-0160.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

Such a scenario isn’t fantasy; something like this actually existed between 2012 and 2014. And if you could initiate a heartbeat before authentication was complete on the site, you could smash and grab the encrypted information before anyone even knew who you were. I’m talking about Heartbleed or CVE 2014-0160.