Remove Applications Remove Authentication Remove Intel Remove Linux
article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Servers/Hardware Menno Finlay-Smits shares information on reducing fan noise on Intel NUCs. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process.

Linux 112
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. Calderon: Paulino Calderon, I'm a senior application security consultant with Websec.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. Calderon: Paulino Calderon, I'm a senior application security consultant with Websec.

article thumbnail

Technology Short Take 125

Scott Lowe

This blending of “traditional” network engineering with containers, Linux, and DevOps tooling is how Matt is setting new trends and directions for the networking industry. Chris Wahl touches on the topic of using GitHub personal tokens to authenticate to HashiCorp Vault. Operating Systems/Applications.

Linux 60
article thumbnail

Technology Short Take 166

Scott Lowe

Frank Denneman digs into Sapphire Rapids memory configurations (Sapphire Rapids is Intel’s 4th generation Scalable Processor Architecture). Security Jeff Warren discusses a potential way for malicious players to bypass multi-factor authentication, aka the “Pass the Cookie” attack.

IPv6 74
article thumbnail

Exploring the most efficient blockchain technology

Dataconomy

It is the underlying technology behind cryptocurrencies like Bitcoin, but its applications extend beyond digital currencies. Beyond cryptocurrencies, blockchain technology has applications in various industries and use cases. At its core, a blockchain is a chain of blocks, where each block contains a set of transactions.

Network 59
article thumbnail

DockerCon 2017 Day 1 Keynote

Scott Lowe

Lots of different frameworks, lots of different applications, lots of different databases…all this freedom of choice creates challenges to security. This led Docker to work with a number of other companies to build a secure, lean, portable Linux subsystem. LinuxKit is a lean, portable, and secure Linux subsystem.

Linux 60