article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.

Linux 112
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

Having segmentation between infrastructure providing data processing and data storage is an example of a broad IT security architectural pattern. All other needs, for example, authentication, encryption, log management, system configuration, would be treated the same—by using the architectural patterns available.

Financial 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Using Curl to Interact with a RESTful API

Scott Lowe

To make consuming this information easier (I hope), I’ll break this information down into a series of examples. Let’s start with passing some JSON data to a REST API to authenticate. Example 1: Authenticating to OpenStack. Example 2: Authenticating to VMware NSX. VMware NSX is one example.

article thumbnail

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Shortly after, the WiFi Alliance released WPA3, which includes many security improvements over WPA2, including: Protection against dictionary attacks via the Simultaneous Authentication of Equals (SAE), which replaces the WPA2 pre-shared key mechanism. This is a great example of being proactive in security. 2 and implement an 802.1x

article thumbnail

Using Paw to Launch an EC2 Instance via API Calls

Scott Lowe

Postman is a cross-platform application, so while my post was centered around Postman on Linux ( Ubuntu , specifically) the steps should be very similar—if not exactly the same—when using Postman on other platforms. This extension is necessary in order to have the API requests sent by Paw properly authenticated to AWS.

article thumbnail

Using Docker Machine with KVM and Libvirt

Scott Lowe

I’ve written before about using Docker Machine with various services/providers; for example, see this article on using Docker Machine with AWS , or this article on using Docker Machine with OpenStack. Docker Machine also supports local hypervisors, such as VMware Fusion or VirtualBox.

Linux 60
article thumbnail

Beginner’s Basics of Kubernetes

Linux Academy

For example, let’s say there are 3 pods, one running and two more scheduled. For example, with Google Kubernetes Engine, or GKE, you will have to opt in to use this resource. The post Beginner’s Basics of Kubernetes appeared first on Linux Academy. In a YAML/JSON format, the defined state is set.

Policies 159