article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Think Linux doesn’t have malware?

Linux 112
article thumbnail

Technology Short Take 144

Scott Lowe

I have a fairly diverse set of links for readers this time around, covering topics from microchips to improving your writing, with stops along the way in topics like Kubernetes, virtualization, Linux, and the popular JSON-parsing tool jq. Sentinel Labs outlines a major malware push that is bypassing Apple’s malware protections.

Linux 90
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 144

Scott Lowe

I have a fairly diverse set of links for readers this time around, covering topics from microchips to improving your writing, with stops along the way in topics like Kubernetes, virtualization, Linux, and the popular JSON-parsing tool jq along the way. Virtualization. I hope you find something useful! Networking. Upgrading to Go 1.17

Linux 60
article thumbnail

How can such a small file do so much damage?

Dataconomy

This is natural in today’s world where data is more valuable than gold because every information is now in the virtual environment and there is nothing that black hat hackers will not do to obtain it. Zip bombs can also be used to spread malware or to steal data. What is a Zip bomb?