Remove Authentication Remove Hardware Remove Linux Remove Network
article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Ivan Pepelnjak dives deep on DHCP relaying on a Linux host.

Linux 112
article thumbnail

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Remember: Wireless signals are not contained to copper or fiber like a wired network — these signals leave your office and your building and travel a good distance. As a pentester, I enjoyed working to crack wireless networks to gain access to the wired network. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Get Started with Mayhem

ForAllSecure

Mayhem can analyze compiled binaries written in languages like C/C++, Go, Rust, Java, and Python that read from a file, standard input, or from the network via a TCP or UDP socket. Mayhem also handles user-land (containerized) Linux applications. Mayhem supports binaries that run on the x86, x64, ARM, and MIPS architectures.

How To 40
article thumbnail

Technology Short Take 141

Scott Lowe

The collection of links shared below covers a fairly wide range of topics, from old Sun hardware to working with serverless frameworks in the public cloud. Networking. Via Ivan Pepelnjak, I was pointed to Jon Langemak’s in-depth discussion of working with Linux VRFs. Servers/Hardware. Virtualization.

Vmware 60
article thumbnail

Technology Short Take 124

Scott Lowe

Networking. Said van de Klundert has a post on screen scraping basics for network engineers. For network engineers just getting started with network automation, I suspect that the information shared here may prove quite useful. For readers who may be new to networking, Daniel Wray has a write-up on network cabling.

Linux 60
article thumbnail

Technology Short Take 136

Scott Lowe

Networking. Servers/Hardware. The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Heidi Howard and Ittai Abraham illustrate some of the challenges of the Raft consensus protocol when there is a network partition. You may find this list helpful.

Linux 60
article thumbnail

Technology Short Take 155

Scott Lowe

Networking. Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. network virtualization). Is the relationship between network virtualization and service mesh closer than some folks might wish to admit? Servers/Hardware.