Remove Authentication Remove Examples Remove Linux Remove Storage
article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.

Linux 112
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

Having segmentation between infrastructure providing data processing and data storage is an example of a broad IT security architectural pattern. All other needs, for example, authentication, encryption, log management, system configuration, would be treated the same—by using the architectural patterns available.

Financial 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 122

Scott Lowe

Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). Michael Gasch shares his tmux setup. Virtualization.

article thumbnail

Technology Short Take 107

Scott Lowe

Christian Kellner provides a brief reminder that not all USB-C ports are Thunderbolt ports, and updates everyone on the status of bolt (Linux utility for working with Thunderbolt ports and peripherals). J Metz has launched his own, storage-focused “Short Takes” series; the first of these is found here. Virtualization.

Vmware 60
article thumbnail

Using Curl to Interact with a RESTful API

Scott Lowe

To make consuming this information easier (I hope), I’ll break this information down into a series of examples. Let’s start with passing some JSON data to a REST API to authenticate. Example 1: Authenticating to OpenStack. Example 2: Authenticating to VMware NSX. VMware NSX is one example.

article thumbnail

Technology Short Take 155

Scott Lowe

Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. Bashayr Alabdullah provides an example of building your own admission controllers in Kubernetes using Go. For relevant storage news, I’d recommend having a look at J Metz’ Storage Short Take 42.

article thumbnail

Using ODrive for Cloud Storage on Linux

Scott Lowe

A few months ago, I stumbled across a service called ODrive (“Oh” Drive) that allows you to combine multiple cloud storage services together. Since that time, I’ve been experimenting with ODrive, testing it to see how well it works, if at all, with my Fedora Linux environment. Fedora, for example, already has ~/.local/bin

Linux 60