article thumbnail

Technology Short Take 176

Scott Lowe

This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Think Linux doesn’t have malware?

Linux 107
article thumbnail

An Updated Look at My Multi-Platform Toolbelt

Scott Lowe

In early 2017 I posted about my (evolving) multi-platform toolbelt , describing some of the applications, standards, and services that I use across my Linux and macOS systems. It’s very likely I’ve pretty much standardized on Thunderbird (which supports OS X, Linux, and Windows).

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 118

Scott Lowe

This web developer security checklist has a nice list of some “current recommended practices” for properly securing web applications/sites. Network bonding in Linux—as outlined in this article —is something I may have to explore. jq , awk , and sed. Learn them , use them, love them.

Linux 60
article thumbnail

Technology Short Take 116

Scott Lowe

If you’re unfamiliar with public key infrastructure (PKI), digital certificates, or encryption, you may find this Linux Journal article helpful. 509v3 digital certificates, how they help enable asymmetric (public/private key) encryption, and the connection to Transport Layer Security (TLS). It provides the basics behind X.509v3

Storage 60
article thumbnail

Tech News Review 19 July 2016

CTOvision

Wall Street Journal . A new cloud environment for business-to-business networks announced by IBM last week will allow companies to test performance, privacy, and interoperability of their blockchain ecosystems within a secure environment, the company said. Based on IBM’s LinuxONE, a Linux-only server designed … [Read More.].

article thumbnail

Best IT and Tech Blogs – Must Read Information Technology Resources 2019

Galido

Information technology is the use of any tech devices, infrastructure, software and processes to create and process, store, secure and exchange all forms of digital data. Our articles are typically focused on software recommendations, business, security, interesting topics and search engine optimization and marketing. Search Security.

Resources 113
article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Security Tech Blogs. Techworld Security Blog. They offer useful relevant topics on security and tech security news.

Resources 107