article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.

Linux 112
article thumbnail

Heptio founder leads Stacklok, a new software supply chain startup that just raised $17.5M

GeekWire

Hinds is the project founder of Sigstore, a tool to verify and authenticate software artifacts. Hinds is also a founding board member of the Linux Foundation’s OpenSSF, a cross-industry effort to improve open-source software security, and was a distinguished engineer at Red Hat. Madrona previously backed Heptio. ”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Learn Azure by Doing with New Azure Training!

Linux Academy

We Azure, just like Microsoft Linux! Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications, check out this blog post if you’re wondering where to get started in Azure. Implement authentication. appeared first on Linux Academy Blog.

article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. Red Hat offers OpenSCAP , can be used to scan Linux hosts for compliance but doesn’t scan Windows hosts. The post Using Secure Configurations | Standardize Your Security appeared first on Linux Academy Blog.

article thumbnail

Configure a Failover Cluster with Pacemaker

Linux Academy

This user will be used to authenticate to the other cluster nodes and to perform actions on the cluster: sudo passwd hacluster. On node1 , authenticate as the hacluster user: sudo pcs cluster auth NODE1 NODE2. The post Configure a Failover Cluster with Pacemaker appeared first on Linux Academy Blog.

article thumbnail

Regulatory Compliance and Red Hat Security

Linux Academy

The Linux Audit system is a great solution. Finally, use the Pluggable Authentication Module (PAM) to set password requirements and lock out users with too many failed logins. Your security team can use the Linux Unified Key Setup (LUKS) to encrypt and decrypt physical disks to keep data secure when not in use. Disk Encryption.

article thumbnail

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Shortly after, the WiFi Alliance released WPA3, which includes many security improvements over WPA2, including: Protection against dictionary attacks via the Simultaneous Authentication of Equals (SAE), which replaces the WPA2 pre-shared key mechanism. or another enterprise-based wireless authentication setup.