article thumbnail

Technology Short Take #51

Scott Lowe

I’m not sure if this falls here or into the “Cloud Computing/Cloud Computing” category, but Shannon McFarland—fellow co-conspirator with the Denver OpenStack Meetup group—has a nice article describing some design and deployment considerations for IPv6 in the OpenStack Kilo release. Here’s one way , using Ravello Systems.

Vmware 60
article thumbnail

Technology Short Take 166

Scott Lowe

Nick Buraglio discusses IPv6 Unique Local Addressing (ULA). Security Jeff Warren discusses a potential way for malicious players to bypass multi-factor authentication, aka the “Pass the Cookie” attack. Diego Crespo talks about PowerShell on Linux and his experience with it.

IPv6 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #65

Scott Lowe

Mike Foley recently published a two-part series on two factor authentication (2FA) for vSphere ( part 1 is here ; part 2 is here ). Want to run Docker Swarm with IPv6? This Yelp Engineering blog post talks about one of these unintended side effects (processes running as PID 1 are treated differently by the Linux kernel).

Vmware 60
article thumbnail

The Hacker Mind Podcast: Scanning the Internet

ForAllSecure

So we have far less users for Mac and Linux than we have on Windows. Vamosi: Most antivirus products are found on Windows, much less so on Mac and Linux. ipv6 is designed to overcome the problems of ipv4 address exhaustion. So it would be very, very hard to scan for all the ipv6 addresses.