article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Servers/Hardware Menno Finlay-Smits shares information on reducing fan noise on Intel NUCs. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process.

Linux 112
article thumbnail

Yubico’s new USB-C security key with NFC could be the one key to unlock them all

The Verge

But with the new YubiKey 5C NFC that’s being announced today, you no longer have to pick between being able to plug your key into a USB-C port or the convenience of NFC authentication, which lets you just tap your key on your device — you can now buy a key that offers both. Hardware-based keys offer extra layer of account security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Microsoft Pluton is a new processor with Xbox-like security for Windows PCs

The Verge

Microsoft Pluton is a security processor that is built directly into future CPUs and will replace the existing Trusted Platform Module (TPM), a chip that’s currently used to secure hardware and cryptographic keys. That means features like BitLocker encryption or Windows Hello authentication will transition over to using Pluton in the future.

Windows 141
article thumbnail

How to Get Started with Mayhem

ForAllSecure

Mayhem also handles user-land (containerized) Linux applications. Here are some helpful tips for quickly determining if your application is compatible: Does the Linux file <app> command say that your application is a Linux ELF file? Mayhem supports binaries that run on the x86, x64, ARM, and MIPS architectures.

How To 40
article thumbnail

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Shortly after, the WiFi Alliance released WPA3, which includes many security improvements over WPA2, including: Protection against dictionary attacks via the Simultaneous Authentication of Equals (SAE), which replaces the WPA2 pre-shared key mechanism. or another enterprise-based wireless authentication setup.

article thumbnail

Technology Short Take 141

Scott Lowe

The collection of links shared below covers a fairly wide range of topics, from old Sun hardware to working with serverless frameworks in the public cloud. Via Ivan Pepelnjak, I was pointed to Jon Langemak’s in-depth discussion of working with Linux VRFs. Servers/Hardware. I hope that you find something useful here.

Vmware 60
article thumbnail

Technology Short Take 136

Scott Lowe

Servers/Hardware. The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Ryan Blunden has authored a fairly comprehensive piece on environment variables in Linux and macOS. Linux may be coming to the Apple M1 chip. You may find this list helpful.

Linux 60