article thumbnail

Technology Short Take #81

Scott Lowe

Here’s a handy list of deprecated Linux network commands and their replacements. If you were at VMworld 2016 last year, this is the integration we demoed live in this Spotlight Session. Konstantin Ryabitsev has a series going on securing a SysAdmin Linux workstation. Servers/Hardware. Intel NUC or SuperMicro E200-8D?

Vmware 60
article thumbnail

Looking Ahead: My 2017 Projects

Scott Lowe

This will most likely be a brief video demo of a project, a walk-through of a particular configuration, or similar. Now that I have a better idea of what’s involved ( this post by Ethan Banks is truly spot on ), I’m going to shoot for 9 episodes in 2017 and give myself some room for really busy periods (like VMworld).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Scanning the Internet

ForAllSecure

So we have far less users for Mac and Linux than we have on Windows. Vamosi: Most antivirus products are found on Windows, much less so on Mac and Linux. anyone tries to reach out to either demo or us about the scans then we'll be happy to answer all the questions and also excluding IP addresses.

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

Vamosi: What Iain’s talking about is that when you step up to an ATM, for example, the bank can … Paterson: But by and large, Justin really nailed it and biometric really is the human side of it. You know you've got banks right now we're really big on Voiceprint. And then you can marry those together to create profiles.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

A kind of digital smash and grab of sensitive information such as the encryption keys created to protect sensitive transactions on a site like Amazon, or your bank with no way to trace any of it back to you. Request Demo Learn More. Vamosi: Imagine being able to attack a company’s servers without leaving a trace.