Remove Apple Remove Firewall Remove Linux Remove Open Source
article thumbnail

Technology Short Take 136

Scott Lowe

This article by Joshua Fox outlines how and when to use each of the various types of firewalls offered by AWS. The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Linux may be coming to the Apple M1 chip. Compute safely.

Linux 60
article thumbnail

Technology Short Take #63

Scott Lowe

At DevOps Networking Forum 2016, I had the opportunity to share a presentation on some Linux networking options. Matt Oswalt recently unveiled (and open sourced) a framework called ToDD, which stands for “Testing on Demand: Distributed”. You may also find this (related) article on memory inside Linux containers to be helpful.

Vmware 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 132

Scott Lowe

I think a fair number of folks may not be aware that the Nginx ingress controller for Kubernetes—both the community version and the Nginx-maintained open source version—do suffer from timeouts and errors resulting from changes in the back-end application’s list of endpoints (think pods being added or removed).

article thumbnail

Technology Short Take #57

Scott Lowe

We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy. This article provides a good introductory overview of Linux iptables commands for configuring host-based firewall rules on your Linux systems. on an Apple Xserve 3,1.

Windows 60