Remove Applications Remove Authentication Remove Examples Remove Linux
article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.

Linux 112
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

The CCA allows overarching enterprise functions and IT shared services to be assessed separately from the business unit’s products/applications that require PCI security compliance. Having segmentation between infrastructure providing data processing and data storage is an example of a broad IT security architectural pattern.

Financial 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Beginner’s Basics of Kubernetes

Linux Academy

You can set up and package everything that you need into an application, and execute that package without the virtual machine overhead that is normally rendered during that process. It does this by providing tools for deploying, scaling, and managing containerized applications. However, it can also be used to secure your applications.

Policies 159
article thumbnail

Using Curl to Interact with a RESTful API

Scott Lowe

To make consuming this information easier (I hope), I’ll break this information down into a series of examples. Let’s start with passing some JSON data to a REST API to authenticate. Example 1: Authenticating to OpenStack. Example 2: Authenticating to VMware NSX.

article thumbnail

Using Paw to Launch an EC2 Instance via API Calls

Scott Lowe

Postman is a cross-platform application, so while my post was centered around Postman on Linux ( Ubuntu , specifically) the steps should be very similar—if not exactly the same—when using Postman on other platforms. This extension is necessary in order to have the API requests sent by Paw properly authenticated to AWS.

article thumbnail

Technology Short Take 122

Scott Lowe

Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). Operating Systems/Applications. Career/Soft Skills.

article thumbnail

Technology Short Take 107

Scott Lowe

Christian Kellner provides a brief reminder that not all USB-C ports are Thunderbolt ports, and updates everyone on the status of bolt (Linux utility for working with Thunderbolt ports and peripherals). Operating Systems/Applications. Highly recommended reading. Cloud Computing/Cloud Management. A simple tip, yes, but useful!

Vmware 60