Remove Authentication Remove Development Remove Linux Remove Operating Systems
article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.

Linux 112
article thumbnail

Microsoft Pluton is a new processor with Xbox-like security for Windows PCs

The Verge

Existing TPMs are separated from CPUs, and attackers have also been developing methods to steal the data and information that flows between a TPM and CPU when they have physical access to a device. That means features like BitLocker encryption or Windows Hello authentication will transition over to using Pluton in the future.

Windows 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 165

Scott Lowe

This post on Cedar—a new policy language developed by AWS—is an interesting read. I’m curious as to the constraints that led AWS to develop a new policy language versus using something like Rego (part of Open Policy Agent); this isn’t something the article touches upon.

article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

Furthermore, if the operating system pattern is Linux Oracle Enterprise, the architect would use that pattern first in its design unless technical constraints made the consumption of this pattern suboptimal to accomplish the solution’s goal. All the other requirements are covered in various CCA assessments.

Financial 105
article thumbnail

Technology Short Take 111

Scott Lowe

VyOS is an open source Linux-based network operating system.). Part 1 covers auto-unsealing Vault ; part 2 covers authenticating to Vault using instance metadata ; and part 3 discusses authenticating to Vault using an IAM user or role. Operating Systems/Applications. Go check out part 2.

article thumbnail

Technology Short Take 114

Scott Lowe

Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Apparently Dell’s new docking stations support firmware updates via Linux. Operating Systems/Applications. Cindy Sridharan has a good article on health checks and graceful degradation in distributed systems.

Linux 60
article thumbnail

Technology Short Take 107

Scott Lowe

Christian Kellner provides a brief reminder that not all USB-C ports are Thunderbolt ports, and updates everyone on the status of bolt (Linux utility for working with Thunderbolt ports and peripherals). Operating Systems/Applications. Highly recommended reading. Cloud Computing/Cloud Management. A simple tip, yes, but useful!

Vmware 60