article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.

Linux 112
article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

This included installing operating system updates, NTP servers, DNS servers, static IPs, audit log options, anti-virus, etc. For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. Network Device Configurations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

GeekWire Podcast: NY Times vs. Microsoft; Plus, Oren Etzioni on AI in 2023 and beyond

GeekWire

A great analogy here is what we’ve seen in operating systems. But we also had Linux, which the open-source movement championed. So I hope that we will have a Linux of language models, a Linux of AI. … In addition, we do need watermarking, authentication, provenance, so we know where things come from.

Microsoft 101
article thumbnail

Microsoft Pluton is a new processor with Xbox-like security for Windows PCs

The Verge

That means features like BitLocker encryption or Windows Hello authentication will transition over to using Pluton in the future. You’ll still be able to build custom PCs with Pluton chips embedded inside, and there should even be support for Linux in the future, too. so you just get it.”

Windows 141
article thumbnail

Technology Short Take 136

Scott Lowe

The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Operating Systems/Applications. Ryan Blunden has authored a fairly comprehensive piece on environment variables in Linux and macOS. Linux may be coming to the Apple M1 chip.

Linux 60
article thumbnail

Why Do Spammers Love The Internet Of Things?

CTOvision

Most aren’t the laptops, tablets, and phones we think of as using the internet: they’re appliances like routers, fridges, cameras, and a million others, each of which is equipped with storage space, an operating system, and a connection to the internet. All of which would be fine if the Internet of Things was secure, but it isn’t.

Internet 150
article thumbnail

Technology Short Take 111

Scott Lowe

VyOS is an open source Linux-based network operating system.). Part 1 covers auto-unsealing Vault ; part 2 covers authenticating to Vault using instance metadata ; and part 3 discusses authenticating to Vault using an IAM user or role. Operating Systems/Applications. Go check out part 2.