Remove Firewall Remove Intel Remove Linux Remove Malware
article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Chief Technologist, Intel Federal LLC, Intel Corporation. Before entering the land of Big Data, Alex spent the better part of ten years wrangling Linux server farms and writing Perl as a contractor to the Department of Defense and Department of Justice. Steve Orrin Chief Technologist, Intel Federal LLC, Intel Corporation.

article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Chief Technologist, Intel Federal LLC, Intel Corporation. Before entering the land of Big Data, Alex spent the better part of ten years wrangling Linux server farms and writing Perl as a contractor to the Department of Defense and Department of Justice. Steve Orrin Chief Technologist, Intel Federal LLC, Intel Corporation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 139

Scott Lowe

In this post , Jakub Sitnicki digs way deep into the Linux kernel to uncover the answer to the question, “Why are there no entries in the conntrack table for SYN packets dropped by the firewall?” Linux malware is getting more sophisticated. ” Get ready to get nerdy! A browser-based side-channel attack ?

Vmware 60
article thumbnail

Technology Short Take 132

Scott Lowe

” Ivan Pepelnjak attempts to answer the question, “How much do I need to know about Linux networking?” ” Speaking of Linux networking…Marek Majkowski of Cloudflare digs deep into conntrack , used for stateful firewalling functionality. Servers/Hardware.

article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

I’m reminded of when I trained to use Kali Linux. Duff: And so, out emerged this Excel spreadsheet of different behaviors that the red team was performing, which would allow us to focus rather on hashes, or specific malware, it allows us to focus on the higher level behaviors to improve our defenses. Duff: Yeah.

Tools 40