article thumbnail

Technology Short Take 176

Scott Lowe

This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. Security In early February a vulnerability was uncovered in a key component of the Linux boot process.

Linux 107
article thumbnail

Technology Short Take 123

Scott Lowe

Eric Sloof mentions the NSX-T load balancing encyclopedia (found here ), which intends to be an authoritative resource to NSX-T load balancing configuration and management. dll , a core Windows cryptographic component) that was rumored to be fixed the next day (January 14) on the first “Patch Tuesday” of 2020.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 144

Scott Lowe

Teri Radichel uses some basketball analogies to explain why defensive (proactive) security strategies are more desirable than reactive security strategies. Bozhidar Batsov shares the story of how he left macOS for Linux and ended up on Windows 10 with WSL. (And since Kevin didn’t define TDP—shame, shame!—see

Linux 90
article thumbnail

Technology Short Take 153

Scott Lowe

Xavier Avrillier walks readers through using Antrea (a Kubernetes CNI built on top of Open vSwitch—a topic I’ve touched on a time or two) to provide on-premise load balancing in Kubernetes. Servers/Hardware. Cabling is hardware, right? What happens to submarine cables when there are massive events, like a volcanic eruption?

Linux 74
article thumbnail

Technology Short Take 144

Scott Lowe

Teri Radichel uses some basketball analogies to explain why defensive (proactive) security strategies are more desirable than reactive security strategies. Bozhidar Batsov shares the story of how he left macOS for Linux and ended up on Windows 10 with WSL. (And since Kevin didn’t define TDP—shame, shame!—see

Linux 60
article thumbnail

Technology Short Take #81

Scott Lowe

Konstantin Ryabitsev has a series going on securing a SysAdmin Linux workstation. Part 1 covers how to choose a Linux distribution, and part 2 discusses some security tips for installing Linux on your SysAdmin workstation. Ben Armstrong shows you how to use PowerShell to give your Windows server a proper fully-qualified domain name.

Vmware 60
article thumbnail

Weekly Update 5-20-2019

Linux Academy

Improved security. For the Red Hat Certified Specialist in Security Prep course , we have the following hands-on labs: Configuring Audit Settings on Red Hat. Implementing an Auto Scaling Group and Application Load Balancer in AWS. This week, we’re diving into brand new DevOps courses. Red Hat Enterprise 8.

Linux 60