article thumbnail

Technology Short Take 158

Scott Lowe

DNS, BGP, hardware-based security, Kubernetes, Linux—they’re all in here. A “highly evasive” Linux malware named OrBit has emerged; see here for more details. Ivan Velichko takes readers on a journey of how Kubernetes reinvented virtual machines (in a good sense). Virtualization. Networking.

Linux 90
article thumbnail

Installing the VMware Horizon Client on Fedora 27

Scott Lowe

In this post, I’ll outline the steps necessary to install the VMware Horizon client for Linux on Fedora 27. Based on information found here and here , I took the following steps before attempting to install the VMware Horizon client for Linux: First, I installed the libpng12 package using sudo dnf install libpng12.

Vmware 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

I understand not everyone “builds” workstations and servers, as many organizations use imaging and virtual templates. Once we’ve created guidelines and templates for deploying secure devices and operating systems, we’re finished, right? Monitoring Changes to Identify Attackers or Rogue Employees.

article thumbnail

DRM Protected eBook: Your Guide to ePUB Security

Kitaboo

Helps in Regulatory Compliance When it comes to digital publishing, one of the main requirements is compliance with several international regulatory guidelines. It lets you create a virtual environment to safekeep and share all your ePUB files, where readers can also download them for offline reading.

eBook 78
article thumbnail

Regulatory Compliance and Red Hat Security

Linux Academy

Virtually every industry, from healthcare to banking and everything in between, has rules for how businesses handle data. If your organization handles either of these sensitive data types, you must follow guidelines to keep your systems secure. The Linux Audit system is a great solution. Stay Compliant with Linux Academy.

article thumbnail

Technology Short Take 114

Scott Lowe

Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Apparently Dell’s new docking stations support firmware updates via Linux. This article has good information on safely using /tmp and /var/tmp on systemd-powered Linux distributions. Virtualization.

Linux 60
article thumbnail

Joint Cybersecurity Advisory: Watch Out for BlackMatter RaaS

SecureWorld News

BlackMatter actors use a separate encryption binary for Linux-based machines and routinely encrypt ESXI virtual machines. The techniques outlined by Easterly that can be done today to protect against ransomware, according to guidelines by the advisory. link] — Jen Easterly (@CISAJen). October 18, 2021.

Backup 75