Remove Guidelines Remove Linux Remove Operating Systems Remove Virtualization
article thumbnail

Technology Short Take 158

Scott Lowe

DNS, BGP, hardware-based security, Kubernetes, Linux—they’re all in here. A “highly evasive” Linux malware named OrBit has emerged; see here for more details. Ivan Velichko takes readers on a journey of how Kubernetes reinvented virtual machines (in a good sense). Operating Systems/Applications.

Linux 90
article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

This included installing operating system updates, NTP servers, DNS servers, static IPs, audit log options, anti-virus, etc. I understand not everyone “builds” workstations and servers, as many organizations use imaging and virtual templates. Monitoring Changes to Identify Attackers or Rogue Employees.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DRM Protected eBook: Your Guide to ePUB Security

Kitaboo

Helps in Regulatory Compliance When it comes to digital publishing, one of the main requirements is compliance with several international regulatory guidelines. It lets you create a virtual environment to safekeep and share all your ePUB files, where readers can also download them for offline reading.

eBook 78
article thumbnail

Incident Response Plan | Roadmap to Securing Your Infrastructure

Linux Academy

When isolating infected workstations, they should be left powered on with the network cables removed and all network adapters disabled within the operating system. When isolating infected virtual servers, a C-level executive must give permission to isolate a server. The virtual server is to remain powered on.

article thumbnail

Technology Short Take 114

Scott Lowe

Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Apparently Dell’s new docking stations support firmware updates via Linux. Operating Systems/Applications. Virtualization. Networking. Servers/Hardware. Career/Soft Skills.

Linux 60
article thumbnail

Technology Short Take 129

Scott Lowe

This is a great read overall, but one sentence in particular really caught my eye: “30 years ago I was able to write a complete multitasking operating system in Z80 assembly code. Jon Langemak is blogging again, and he jumps back into the “blogging saddle” with a post on working with tc on Linux systems.

Linux 60
article thumbnail

Using Puppet for Account Management

Scott Lowe

The key to making it work is the idea of a virtual resource. In Puppet, you are normally only allowed to define a resource once; you’d then apply that same resource against multiple systems. The Puppet Labs site does a much better job of explaining virtual resources. Realize the virtual user resources where needed.

Resources 126