article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Servers/Hardware Menno Finlay-Smits shares information on reducing fan noise on Intel NUCs. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process.

Linux 112
article thumbnail

Microsoft Pluton is a new processor with Xbox-like security for Windows PCs

The Verge

Pluton is based on the same security technologies used to protect Xbox consoles , and Microsoft is working with Intel, AMD, and Qualcomm to combine it into future CPUs. That means features like BitLocker encryption or Windows Hello authentication will transition over to using Pluton in the future. so you just get it.”

Windows 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IDF 2013: Enhancing OpenStack with Intel Technologies

Scott Lowe

This is a liveblog of Intel Developer Forum (IDF) 2013 session EDCS003, titled “Enhancing OpenStack with Intel Technologies for Public, Private, and Hybrid Cloud.” ” The presenters are Girish Gopal and Malini Bhandaru, both with Intel. Intel has also done work on TCP plus Geo-Tagging.

Intel 60
article thumbnail

Technology Short Take 125

Scott Lowe

This blending of “traditional” network engineering with containers, Linux, and DevOps tooling is how Matt is setting new trends and directions for the networking industry. Chris Wahl touches on the topic of using GitHub personal tokens to authenticate to HashiCorp Vault. Servers/Hardware. Nothing this time around.

Linux 60
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.

article thumbnail

Technology Short Take 166

Scott Lowe

Frank Denneman digs into Sapphire Rapids memory configurations (Sapphire Rapids is Intel’s 4th generation Scalable Processor Architecture). Security Jeff Warren discusses a potential way for malicious players to bypass multi-factor authentication, aka the “Pass the Cookie” attack.

IPv6 74