Remove Authentication Remove Linux Remove Operating Systems Remove Virtualization
article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.

Linux 112
article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

This included installing operating system updates, NTP servers, DNS servers, static IPs, audit log options, anti-virus, etc. For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. Network Device Configurations. How do we do this kind of monitoring?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 155

Scott Lowe

Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. network virtualization). Is the relationship between network virtualization and service mesh closer than some folks might wish to admit? Operating Systems/Applications. Virtualization.

article thumbnail

Technology Short Take 107

Scott Lowe

Christian Kellner provides a brief reminder that not all USB-C ports are Thunderbolt ports, and updates everyone on the status of bolt (Linux utility for working with Thunderbolt ports and peripherals). Operating Systems/Applications. Virtualization. Highly recommended reading. Cloud Computing/Cloud Management.

Vmware 60
article thumbnail

Technology Short Take 114

Scott Lowe

Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Apparently Dell’s new docking stations support firmware updates via Linux. Operating Systems/Applications. Cindy Sridharan has a good article on health checks and graceful degradation in distributed systems.

Linux 60
article thumbnail

Technology Short Take 124

Scott Lowe

Redpill Linpro talks to readers about their new routers running Cumulus Linux. Chip Zoller makes the argument in favor of running Kubernetes in/on virtual machines. Colleague and teammate Eric Shanks takes readers through what’s necessary to do Active Directory authentication for Kubernetes clusters. Virtualization.

Linux 60
article thumbnail

Technology Short Take 122

Scott Lowe

Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). Operating Systems/Applications. Virtualization.