Remove Authentication Remove Linux Remove Network Remove Open Source
article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Ivan Pepelnjak dives deep on DHCP relaying on a Linux host.

Linux 112
article thumbnail

MicroK8s: Up and Running in Azure

Linux Academy

By now you’ve heard the stories that Microsoft loves Linux and fully embraces the open-source world. Microsoft, under Satya Nadella, has taken a new stance on open-source , which to some is a complete flip-flop from the Microsoft of the past. Windows Subsystem for Linux (WSL). Visual Studio Code.

Linux 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 136

Scott Lowe

Networking. The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Heidi Howard and Ittai Abraham illustrate some of the challenges of the Raft consensus protocol when there is a network partition. Linux may be coming to the Apple M1 chip.

Linux 60
article thumbnail

Technology Short Take 165

Scott Lowe

Over the last few weeks, I’ve been collecting articles I wanted to share with readers on major areas in technology: networking, security, storage, virtualization, cloud computing, and OSes/applications. Denis Mulyalin shows how to use Nornir, Salt, and NetBox to template your network tests. There is a ton of information here!

article thumbnail

Technology Short Take 122

Scott Lowe

Networking. Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). Spend time with your family instead.

article thumbnail

Technology Short Take 114

Scott Lowe

Networking. Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Apparently Dell’s new docking stations support firmware updates via Linux. This article has good information on safely using /tmp and /var/tmp on systemd-powered Linux distributions.

Linux 60
article thumbnail

Technology Short Take 124

Scott Lowe

Networking. Said van de Klundert has a post on screen scraping basics for network engineers. For network engineers just getting started with network automation, I suspect that the information shared here may prove quite useful. For readers who may be new to networking, Daniel Wray has a write-up on network cabling.

Linux 60