article thumbnail

Technology Short Take 175

Scott Lowe

The Linux kernel project has become a CVE Numbering Authority (CNA); Greg Kroah-Hartman wrote a blog post that discusses this in more depth. The Open Constructs Foundation recently launched a “community-driven CDK construct library initiative,” which seeks to provide a way for the CDK community to build and share CDK constructs.

article thumbnail

Technology Short Take 151

Scott Lowe

Operating Systems/Applications. Dennis Felsing shares some thoughts on switching to macOS after 15 years on Linux. Running Docker on an M1 Max-based system? BIOS updates without a reboot , and under Linux first? There’s some useful and practical advice here, in my opinion. Read more here. Yes please!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 169

Scott Lowe

In the end, he comes up with using a general purpose programming language (via CDK in his article) to write higher-level constructs. Operating Systems/Applications There’s been a ton of coverage about the Red Hat changes around RHEL sources and such, so I won’t bother going into any detail on that.

article thumbnail

Technology Short Take #81

Scott Lowe

Humair Ahmed of VMware shares some details on a new control plane resiliency feature recently added to VMware NSX: Controller Disconnected Operation (CDO) mode. Here’s a handy list of deprecated Linux network commands and their replacements. Konstantin Ryabitsev has a series going on securing a SysAdmin Linux workstation.

Vmware 60
article thumbnail

Technology Short Take 130

Scott Lowe

” Want to use a Yubikey to automatically lock and unlock your Linux system? Operating Systems/Applications. Via Ivan Pepelnjak (who in turn got it from Julia Evans), I learned about entr , a Linux CLI tool to run arbitrary commands when files change. Cloud Computing/Cloud Management. Programming.

article thumbnail

Technology Short Take 138

Scott Lowe

Operating Systems/Applications. Via TecMint, James Kiarie explains how to use VirtualBox VMs on KVM in Linux. As always, I welcome all constructive feedback and I love hearing from readers, so feel free to reach out to me on Twitter. Katie Gamanji shares some information on passing the CKAD. Virtualization.

IPv6 60
article thumbnail

Technology Short Take 131

Scott Lowe

Here’s a review of targeted attacks and APTs (advanced persistent threats) on Linux. Operating Systems/Applications. If you’re relatively new to the Linux/macOS/UNIX/*BSD side of the world, this post on making the most of OpenSSH may prove quite useful. More details are found in this article.

Linux 60