Remove Authentication Remove How To Remove Linux Remove Operating Systems
article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Think Linux doesn’t have malware?

Linux 112
article thumbnail

GeekWire Podcast: NY Times vs. Microsoft; Plus, Oren Etzioni on AI in 2023 and beyond

GeekWire

A great analogy here is what we’ve seen in operating systems. But we also had Linux, which the open-source movement championed. So I hope that we will have a Linux of language models, a Linux of AI. … In addition, we do need watermarking, authentication, provenance, so we know where things come from.

Microsoft 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

This included installing operating system updates, NTP servers, DNS servers, static IPs, audit log options, anti-virus, etc. For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. .” Network Device Configurations.

article thumbnail

Technology Short Take 125

Scott Lowe

Tim Smith shares how to set up additional blocklists for Pi-Hole for your home lab. This blending of “traditional” network engineering with containers, Linux, and DevOps tooling is how Matt is setting new trends and directions for the networking industry. Operating Systems/Applications. Good stuff here!

Linux 60
article thumbnail

Technology Short Take 111

Scott Lowe

I’m not sure how I missed that part 2 was published only 2 days later, so I’m rectifying that now. Paul Fitzgerald shows how to use Hyper-V and Docker to build a VyOS 1.2.0 VyOS is an open source Linux-based network operating system.). Operating Systems/Applications. Go check out part 2.

article thumbnail

Technology Short Take 165

Scott Lowe

Denis Mulyalin shows how to use Nornir, Salt, and NetBox to template your network tests. Lee Briggs covers the plethora of ways to authenticate to AWS. The author, Kostis Kapelonis, first talks about what not to do , then follows up with a post that has recommendations on how to model multiple environments.

article thumbnail

Technology Short Take 122

Scott Lowe

Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). Operating Systems/Applications.