article thumbnail

Technology Short Take 158

Scott Lowe

DNS, BGP, hardware-based security, Kubernetes, Linux—they’re all in here. A “highly evasive” Linux malware named OrBit has emerged; see here for more details. See this list of guidelines from Richard Bejarano. Hopefully I’ve managed to find something useful for someone. Networking. Programming.

Linux 90
article thumbnail

Technology Short Take 114

Scott Lowe

Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Apparently Dell’s new docking stations support firmware updates via Linux. This article has good information on safely using /tmp and /var/tmp on systemd-powered Linux distributions. Networking. Virtualization.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 121

Scott Lowe

A new VPN security flaw has been uncovered that affects a wide range of UNIX- and Linux-based systems. Here’s an article from Marko Saric on his switch from macOS to Linux. Samuel Karp has a list of guidelines for designing and testing software daemons. Cloud Computing/Cloud Management. Nothing this time; sorry!

Vmware 60
article thumbnail

Technology Short Take #80

Scott Lowe

As opposed to just encrypting data at the transport level (although Acra does that between components of its architecture) or just encrypting data at the storage level (using an encrypted file system or similar), Acra targets encrypting data at the table/row/column level within a database. This article helps provide some guidelines.

article thumbnail

Using Puppet for Account Management

Scott Lowe

As such, we’ll want to follow Puppet’s guidelines for module structures. Visit the site for more information on virtualization, servers, storage, and other enterprise technologies. Linux Automation OSS Puppet' Let’s tackle that first step: creating the class and defined type. Getting Hiera Working.

Resources 126
article thumbnail

Technology Short Take #50

Scott Lowe

It’s important to note that these security enhancements don’t really represent “net new” functionality but rather reflect existing Linux security constructs now being exposed and usable by Docker. Here are some general guidelines for configuring syslog forwarding on a Cisco ASA firewall. Cloud Computing/Cloud Management.

Vmware 60
article thumbnail

Technology Short Take 166

Scott Lowe

This article by Kirill Shirinkin provides, in the author’s words, “some guidelines that will help you to assess if Argo CD makes sense for your setup” Operating Systems/Applications Stewart X Addison shares some macOS “first experiences” from a Linux user.

IPv6 74