Remove Applications Remove Authentication Remove Linux Remove Open Source
article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.

Linux 112
article thumbnail

MicroK8s: Up and Running in Azure

Linux Academy

By now you’ve heard the stories that Microsoft loves Linux and fully embraces the open-source world. Microsoft, under Satya Nadella, has taken a new stance on open-source , which to some is a complete flip-flop from the Microsoft of the past. Windows Subsystem for Linux (WSL). Visual Studio Code.

Linux 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GeekWire Podcast: NY Times vs. Microsoft; Plus, Oren Etzioni on AI in 2023 and beyond

GeekWire

… And when you went from one application to the other, you had to redo it all from scratch. ” The need for strong open-source models: “The consolidation of power in AI is a huge risk. The countervailing forces are, number one, open source models. ” AI2 technical director Oren Etzioni.

Microsoft 103
article thumbnail

Technology Short Take 114

Scott Lowe

Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Apparently Dell’s new docking stations support firmware updates via Linux. Operating Systems/Applications. This article has good information on safely using /tmp and /var/tmp on systemd-powered Linux distributions.

Linux 60
article thumbnail

Technology Short Take 136

Scott Lowe

The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Operating Systems/Applications. Ryan Blunden has authored a fairly comprehensive piece on environment variables in Linux and macOS. Linux may be coming to the Apple M1 chip.

Linux 60
article thumbnail

Technology Short Take 165

Scott Lowe

Over the last few weeks, I’ve been collecting articles I wanted to share with readers on major areas in technology: networking, security, storage, virtualization, cloud computing, and OSes/applications. Lee Briggs covers the plethora of ways to authenticate to AWS. There’s quite a bit of good information there.

article thumbnail

Technology Short Take 122

Scott Lowe

Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). Operating Systems/Applications. Career/Soft Skills.