Remove Article Remove Devops Remove Linux Remove Open Source
article thumbnail

Technology Short Take 164

Scott Lowe

I’ve got another collection of links to articles on networking, security, cloud, programming, and career development—hopefully you find something useful! This article on using osquery for behavioral detection of macOS malware was an interesting read. Read this article and you will be enlightened.

article thumbnail

Technology Short Take 153

Scott Lowe

This article contains some good information on IPv6 for those who are just starting to get more familiar with it, although toward the end it turns into a bit of an advertisement. Although Linux is often considered to be superior to Windows and macOS with regard to security, it is not without its own security flaws. Networking.

Linux 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #60

Scott Lowe

As usual, I’ve gathered what I hope to be a useful but varied collection of articles and links on key data center technologies. The rise of Linux in importance in the networking industry continues, with Arista announcing enhancements to Arista EOS to support—among other things—Docker containers. Networking. Servers/Hardware.

Vmware 60
article thumbnail

Technology Short Take #60

Scott Lowe

As usual, I’ve gathered what I hope to be a useful but varied collection of articles and links on key data center technologies. The rise of Linux in importance in the networking industry continues, with Arista announcing enhancements to Arista EOS to support—among other things—Docker containers. Networking. Servers/Hardware.

Vmware 60
article thumbnail

Technology Short Take 156

Scott Lowe

I’d never heard of Pipy before seeing it in this article , but it look like it could be quite useful for a number of use cases. BPFDoor, as it is known, is a passive backdoor that allows threat actors to remotely connect to a Linux shell. Tetragon is Isovalent’s newly open-sourced security framework.

Vmware 74
article thumbnail

Technology Short Take 122

Scott Lowe

Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). This article has a list of tips and tricks for zsh.

article thumbnail

Technology Short Take #79

Scott Lowe

Skydive is (in the project’s own words) an “open source real-time network topology and protocols analyzer.” OK, now that I’ve mentioned Skydive, I can talk about this article that provides an example of functional SDN testing with Terraform and Skydive. I found this article on SELinux concepts for humans to be quite helpful.

Linux 60