Remove Architecture Remove Authentication Remove Open Source Remove Operating Systems
article thumbnail

Technology Short Take 155

Scott Lowe

Isovalent—the company behind the Cilium project—has been talking a lot about how the use of eBPF will transform things, including the architecture of a service mesh. Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. Operating Systems/Applications.

article thumbnail

Technology Short Take 124

Scott Lowe

Colleague and teammate Eric Shanks takes readers through what’s necessary to do Active Directory authentication for Kubernetes clusters. Operating Systems/Applications. Chip Zoller makes the argument in favor of running Kubernetes in/on virtual machines. Both are good articles.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

As I produce this episode, there's a dangerous new vulnerability known informally as Log4Shell, it’s a flaw in an open source Java logging library developed by the Apache Foundation and, in the hands of a malicious actor, could allow for remote code injection. Vamosi: The idea behind Open Source is great.

article thumbnail

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

As organizations increase their use of Kubernetes in public and Hybrid cloud architectures, it is important not to let a maiden voyage end like a Titanic catastrophe. Vulnerabilities at the operating system level may be exploited by rogue container workloads if not hardened. Implement RBAC.

article thumbnail

Technology Short Take #25

Scott Lowe

I came across this post on CloudFoundry’s User Account and Authentication Service (the UAA). This is an awesome overview of the OpenStack Folsom architecture , courtesy of Ken Pepple. Operating Systems/Applications. If you’re seeking more information on UAA, this looks like a good place to start.

Storage 92
article thumbnail

The Hacker Mind Podcast: Digital Forensics

ForAllSecure

Like Locard’s principle, if you interact with a digital system, chances are very good that you are leaving traces. To be good at digital forensics, to be a digital Sherlock Holmes, you need to understand systems architecture. The tools are open source, and Paula has a team of experts that helps build these tools.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.