Remove Authentication Remove Guidelines Remove Hardware Remove Linux
article thumbnail

Technology Short Take 114

Scott Lowe

Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Servers/Hardware. Apparently Dell’s new docking stations support firmware updates via Linux. This article has good information on safely using /tmp and /var/tmp on systemd-powered Linux distributions.

Linux 60
article thumbnail

Technology Short Take 166

Scott Lowe

Servers/Hardware Kevin Houston provides some instructions on backing up the Dell PowerEdge MX7000 settings and configurations. Security Jeff Warren discusses a potential way for malicious players to bypass multi-factor authentication, aka the “Pass the Cookie” attack. Both are great reads.

IPv6 74
article thumbnail

History of Computer Hacking and Cybersecurity Threats: From the 50s to Today

ForAllSecure

“Hacker” referred to people who explored the limits of computer technology and found ways to modify or improve computer hardware and software. 1970s & 1980s: First Laws and Guidelines Created Around Computer Security During the early 1970s, hacking was still mostly a form of exploration and experimentation.

Malware 75