article thumbnail

Technology Short Take #59

Scott Lowe

Welcome to Technology Short Take #59, the first Technology Short Take of 2016. Cumulus VX, if you aren’t aware, is a community-supported virtual appliance version of Cumulus Linux aimed at helping folks preview and test “full-blown” Cumulus Linux (which, of course, requires compatible hardware). Networking. Good stuff Juan!

Vmware 60
article thumbnail

Technology Short Take #59

Scott Lowe

Welcome to Technology Short Take #59, the first Technology Short Take of 2016. Cumulus VX, if you aren’t aware, is a community-supported virtual appliance version of Cumulus Linux aimed at helping folks preview and test “full-blown” Cumulus Linux (which, of course, requires compatible hardware). Networking. Good stuff Juan!

Devops 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hey is a wildly opinionated new email service from the makers of Basecamp

The Verge

It will insist that you use two-factor authentication, for example — and via QR code, too; none of that insecure SMS business. Hey isn’t the first independent email platform to arrive since Gmail; privacy-focused ProtonMail , for example, has been open to the public since 2016. “Most apps think they’re the center of the world.”.

Examples 102
article thumbnail

Using Postman to Launch an EC2 Instance via API Calls

Scott Lowe

In any case, I’ve been exploring the APIs using Postman (when on Linux) and Paw (when on macOS), and in this post I’ll share how to use Postman to launch an EC2 instance via API calls. I’ll be using Linux, but since Postman is cross-platform then this post should cover most users. Set up the Postman Environment.

Tools 78
article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

So we include other telemetry that seeks to authenticate that the entity logging in is who they say they are. Without a basic ability to authenticate these characters, there’d be no drama, no romance, no tragedy. So that’s why you need multi factor authentication. Think about it. And important.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.