Remove Article Remove Authentication Remove Linux Remove Virtualization
article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.

Linux 112
article thumbnail

Technology Short Take 155

Scott Lowe

I mean, don’t you want to spend this weekend catching up on some technology-related articles instead of cooking on the grill and gathering with friends and family? Still, for those who need a little technology fix over the weekend, hopefully I’ve included something useful in the list of articles below. I certainly hope not!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Potential Fix for Kerberos, SSH, LDAP, and Active Directory Issue

Scott Lowe

I had a reader contact me with a question on using Kerberos and LDAP for authentication into Active Directory, based on Active Directory integration work I did many years ago. The issue was that he was experiencing a problem using native Kerberos authentication against Active Directory with SSH. Thanks Tomas!

article thumbnail

Technology Short Take 114

Scott Lowe

There will be a longer gap than usual before the next Tech Short Take (more details to come on Monday), but in the meantime here’s some articles and links to feed your technical appetite. Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Virtualization. Networking.

Linux 60
article thumbnail

Technology Short Take 124

Scott Lowe

It seems like the natural progression of the Tech Short Takes is moving toward monthly articles, since it’s been about a month since my last one. Redpill Linpro talks to readers about their new routers running Cumulus Linux. This article from Bruce Schneier is worth reading. Both are good articles. Servers/Hardware.

Linux 60
article thumbnail

Technology Short Take 107

Scott Lowe

In response to my request for feedback in the last Technology Short Take, a few readers responded in favor of a more regular publication schedule even if that means the articles are shorter in length. Michael Hausenblas has an informative article with information on Kubernetes RBAC defaults. Virtualization. Networking.

Vmware 60
article thumbnail

Joint Cybersecurity Advisory: Watch Out for BlackMatter RaaS

SecureWorld News

SecureWorld News digs into BlackMatter's process and breaks down the risk mitigation tips in this article. BlackMatter actors use a separate encryption binary for Linux-based machines and routinely encrypt ESXI virtual machines. How do BlackMatter hackers infiltrate systems? link] — Jen Easterly (@CISAJen). October 18, 2021.

Backup 81