1_r/devopsish

1_r/devopsish

54572 bookmarks
Custom sorting
Sending a Difficult Email
Sending a Difficult Email
Dear new developer, Sometimes you have to send a difficult or awkward email. But, before you send it, think about whether it should be an email or if an in-person conversation, phone call, or video…
·letterstoanewdeveloper.com·
Sending a Difficult Email
Phishing campaign targets Ukraine, allies ahead of NATO summit
Phishing campaign targets Ukraine, allies ahead of NATO summit
Documents lobbying for Ukraine's membership in the alliance are being used as lures by a campaign that appears to be linked to the RomCom hacking group, according to researchers at BlackBerry. trying to infect guests with malicious software, according cybersecurity firm BlackBerry.
·therecord.media·
Phishing campaign targets Ukraine, allies ahead of NATO summit
SUSE Announces Its Forking RHEL, To Maintain A RHEL-Compatible Distro
SUSE Announces Its Forking RHEL, To Maintain A RHEL-Compatible Distro
Yesterday Oracle published an interesting announcement and doubled down on their intentions of keeping Oracle Linux compatible with Red Hat Enterprise Linux following Red Hat's controversial announcement last month
·phoronix.com·
SUSE Announces Its Forking RHEL, To Maintain A RHEL-Compatible Distro
Bad managers and people mailing it in are giving those of us that have worked from home for decades a bad name. | The debate over 'fake work' in the tech industry misses the real culprit: lazy managers
Bad managers and people mailing it in are giving those of us that have worked from home for decades a bad name. | The debate over 'fake work' in the tech industry misses the real culprit: lazy managers
Tech executives and investors have claimed that loafing employees are dragging down companies. But experts say the real problem is "lazy management."
·businessinsider.com·
Bad managers and people mailing it in are giving those of us that have worked from home for decades a bad name. | The debate over 'fake work' in the tech industry misses the real culprit: lazy managers
Shortening the Let's Encrypt Chain of Trust
Shortening the Let's Encrypt Chain of Trust
When Let’s Encrypt first launched, we needed to ensure that our certificates were widely trusted. To that end, we arranged to have our intermediate certificates cross-signed by IdenTrust’s DST Root CA X3. This meant that all certificates issued by those intermediates would be trusted, even while our own ISRG Root X1 wasn’t yet. During subsequent years, our Root X1 became widely trusted on its own. Come late 2021, our cross-signed intermediates and DST Root CA X3 itself were expiring.
·letsencrypt.org·
Shortening the Let's Encrypt Chain of Trust
Resilience requires helping each other out
Resilience requires helping each other out
A common failure mode in complex systems is that some part of the system hits a limit and falls over. In the software world, we call this phenomenon resource exhaustion, and a classic example of th…
·surfingcomplexity.blog·
Resilience requires helping each other out
When does an old Mac become unsafe to use? - The Mac Security Blog
When does an old Mac become unsafe to use? - The Mac Security Blog
Macs can last a long time, far longer than Apple will support them with macOS updates. If your Mac cannot run the latest version of macOS, it is unsafe to use online. Here are some tips for getting the most out of your old Mac, safely.
·intego.com·
When does an old Mac become unsafe to use? - The Mac Security Blog
Canonical's Leading LXD Engineer Quits - OMG! Ubuntu
Canonical's Leading LXD Engineer Quits - OMG! Ubuntu
Stéphane Graber has announced their resignation from Canonical after 12 years of working at the company, mostly on LXD. The decision follows news last
·omgubuntu.co.uk·
Canonical's Leading LXD Engineer Quits - OMG! Ubuntu
PoisonGPT: How we hid a lobotomized LLM on Hugging Face to spread fake news
PoisonGPT: How we hid a lobotomized LLM on Hugging Face to spread fake news
We will show in this article how one can surgically modify an open-source model, GPT-J-6B, and upload it to Hugging Face to make it spread misinformation while being undetected by standard benchmarks.
·blog.mithrilsecurity.io·
PoisonGPT: How we hid a lobotomized LLM on Hugging Face to spread fake news
As the industrial IoT looks more like IT, security must change - Stacey on IoT | Internet of Things news and analysis
As the industrial IoT looks more like IT, security must change - Stacey on IoT | Internet of Things news and analysis
This story was originally published in my July 07, 2023 newsletter. You can sign up for the newsletter here.  As tensions rise between the U.S. and China and Russia continues sponsoring cybersecurity attacks around the globe, it’s clear cybersecurity is never going back to being a niche issue CEOs and boards can foist off to a CSO or IT […]
·staceyoniot.com·
As the industrial IoT looks more like IT, security must change - Stacey on IoT | Internet of Things news and analysis
Must read! I remember a time in my life where if I got hacked I’d basically loose my job. Sucks but that’s the kind of commitment some employers want | Analyzing Attack Opportunities Against Information Security Practitioners
Must read! I remember a time in my life where if I got hacked I’d basically loose my job. Sucks but that’s the kind of commitment some employers want | Analyzing Attack Opportunities Against Information Security Practitioners
Security researchers are increasingly targeted for attack. In this guest post, Jared Stroud explores the risks and how practitioners can protect themselves.
·sentinelone.com·
Must read! I remember a time in my life where if I got hacked I’d basically loose my job. Sucks but that’s the kind of commitment some employers want | Analyzing Attack Opportunities Against Information Security Practitioners