article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Think Linux doesn’t have malware?

Linux 112
article thumbnail

Technology Short Take 151

Scott Lowe

Nick Schmidt talks about using GitOps with the NSX Advanced Load Balancer. The story of a developer deliberately polluting their open source projects—as outlined here for the “colors.js” Cross-platform malware. What do you think microsegmentation means ? Servers/Hardware. ” and “faker.js”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How can such a small file do so much damage?

Dataconomy

Zip bombs can also be used to spread malware or to steal data. Once the antivirus software is disabled, the attacker can then send other malware to the company’s computers. There are many different WAF solutions available, both commercial and open source.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

If you're working with an open source kind of project or organization plan that like, hey, we'll use CTF D, we'll have that open source framework that we can put to use for the front end, and that will handle users and user registration login etc. And the scoreboard, it'll just kind of create and generate for you then.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

If you're working with an open source kind of project or organization plan that like, hey, we'll use CTF D, we'll have that open source framework that we can put to use for the front end, and that will handle users and user registration login etc. And the scoreboard, it'll just kind of create and generate for you then.