Remove Applications Remove Construction Remove Hardware Remove Operating Systems
article thumbnail

Technology Short Take 173

Scott Lowe

Servers/Hardware Alex Ellis provides some details on his workflow for booting Raspberry Pi 5 from NVMe. Tom Hummel finds himself veering back into a hardware-based home lab (instead of a cloud-based lab). Quintessence Anx of SPIRL shares some guidance on how to construct SPIFFE IDs. pertaining to administrative credentials.

article thumbnail

Technology Short Take 160

Scott Lowe

Servers/Hardware. Operating Systems/Applications. I loved this article by Lawrence Jones about how his organization tested and prepared for the impact of latency on their application. 509 certificates used in mTLS. Timothy Prickett Morgan takes a look at Tesla’s “Dojo” supercomputer. Programming.

Cloud 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 159

Scott Lowe

Servers/Hardware. Operating Systems/Applications. If you have any feedback (all constructive feedback is welcome!), Speaking of WireGuard: here’s a tutorial on setting up WireGuard on Ubuntu (both 20.04 are covered). Vaughan-Nichols discusses a leak discovered in Intel SGX. Thanks for reading!

article thumbnail

Technology Short Take 151

Scott Lowe

Servers/Hardware. Operating Systems/Applications. If you have any feedback for me—constructive criticism, praise, suggestions for where I can find more articles (especially if the site supports RSS!), Aidan Steele examines how VPC sharing could potentially improve security and reduce cost. Read more here.

article thumbnail

Password Encryption 101: Best Practices Guide for Orgs of All Sizes

SecureWorld News

Keeping software and operating systems up to date, using security software, and being careful when opening email attachments or clicking links can help avoid malware. Argon2 Argon2 is a password hashing function explicitly constructed to resist both brute-force attacks and pre-computed hash table attacks.

article thumbnail

Technology Short Take 125

Scott Lowe

Servers/Hardware. Guido Appenzeller—once my manager at VMware, now at Yubico—shared this article about the Cerberus banking trojan , which is apparently now able to steal two-factor authentication (2FA) tokens from the Google Authenticator application. Operating Systems/Applications. Career/Soft Skills.

Linux 60
article thumbnail

Technology Short Take 142

Scott Lowe

This time around, the Networking section is a bit light, but I’ve got plenty of cloud computing links and articles for you to enjoy, along with some stuff on OSes and applications, programming, and soft skills. Servers/Hardware. Operating Systems/Applications. Networking. And that’s all, folks!

Cloud 60