article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.

Linux 112
article thumbnail

MicroK8s: Up and Running in Azure

Linux Academy

By now you’ve heard the stories that Microsoft loves Linux and fully embraces the open-source world. Windows Subsystem for Linux (WSL). Contact them via email: linux@microsoft.com. The only requirement is a Linux VM. Cloud sandboxes are included with your Linux Academy subscription. Visual Studio Code.

Linux 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Configure a Failover Cluster with Pacemaker

Linux Academy

This user will be used to authenticate to the other cluster nodes and to perform actions on the cluster: sudo passwd hacluster. On node1 , authenticate as the hacluster user: sudo pcs cluster auth NODE1 NODE2. The post Configure a Failover Cluster with Pacemaker appeared first on Linux Academy Blog.

article thumbnail

Potential Fix for Kerberos, SSH, LDAP, and Active Directory Issue

Scott Lowe

I had a reader contact me with a question on using Kerberos and LDAP for authentication into Active Directory, based on Active Directory integration work I did many years ago. The issue was that he was experiencing a problem using native Kerberos authentication against Active Directory with SSH. Thanks Tomas!

article thumbnail

Learn Azure by Doing with New Azure Training!

Linux Academy

We Azure, just like Microsoft Linux! Linux Academy is the only way to get exam-like training for multiple Microsoft Azure certifications, check out this blog post if you’re wondering where to get started in Azure. Implement authentication. Review migration strategies for Hyper-V virtual machines.

article thumbnail

Technology Short Take 155

Scott Lowe

Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. network virtualization). Is the relationship between network virtualization and service mesh closer than some folks might wish to admit? Virtualization. Servers/Hardware. Career/Soft Skills.

article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. I understand not everyone “builds” workstations and servers, as many organizations use imaging and virtual templates. Network Device Configurations. We need to disable silly protocols, such as “finger.”