Gartner™ quick answer: How can organizations use DNS to improve their security posture
Looking to improve your organization’s security posture? Don’t forget to secure the DNS-layer! Learn how – and why – to invest in DNS-layer security here.
Printing on Linux is easy, but sometimes it feels like a lot of work to launch an application, open a file, find the Print selection in the menu, click a confirmation button, and so on. When you're a Linux terminal user, you often want to perform complex actions with simple triggers. Printing is complex, and there's little as simple as the lpr command.
Monitoring IT assets is an essential task for any IT department. Still, due to the growing number of devices in corporate networks, it is getting more and more challenging to find an approach that is flexible enough to monitor the wide range of available systems properly. It's essential to have a monitoring tool that is flexible, scalable, and easy to use.
In previous articles, I have written about container images and runtimes. In this article, I look at how containers are made possible by a foundation of some special Linux technologies, including namespaces and control groups.
Using Tor to aid various system administration tasks, including checking firewall rules, bypassing internal network restrictions and connecting to remote systems that are behind NAT/CGNAT.
Working with interdependent Postgres functions and materialized views
In Working with Postgres types I showed an example of a materialized view that depends on a typed set-returning function. Because Postgres knows about that dependency, it won’t allow DROP FUN…
If you’ve ever spent ages waiting for an Ansible playbook to get through a bunch of tasks so yours can be tested, then this article is for you. Ansible can be pretty tedious to debug and obsc…
The Linux kernel is turning 30 this year! If you're like us, that's a big deal and we are celebrating Linux this week with a couple of special posts. Today we start with a roundup of responses from around the community answering "What Linux kernel module can you not live without? And, why?" Let's hear what these 10 enthusiasts have to say. I guess some kernel developers will run away screaming when they hear my answer. Still, I list here two of the most controversial modules:
Trend Micro Points Out a Giant Cloud Linux Security Problem - The New Stack
The number one problem, according to the security company's latest report, is organizations using out-of-date, unsupported operating systems and programs.
The stat command, included in the GNU coreutils package, provides a variety of metadata, including file size, inode location, access permissions and SELinux context, and creation and modification times, about files and filesystems. It's a convenient way to gather information that you usually need several different commands to acquire.
CAA is a type of DNS record that allows site owners to specify which Certificate Authorities (CAs) are allowed to issue certificates containing their domain names. It was standardized in 2013 by RFC 6844 to allow a CA “reduce the risk of unintended certificate mis-issue.” By default, every public CA is allowed to issue certificates for any domain name in the public DNS, provided they validate control of that domain name.
A Certification Authority Authorization (CAA) record is used to specify which certificate authorities (CAs) are allowed to issue certificates for a domain.
How to view SSL certificate (PEM file) using openssl ? - Oracle Trainings for Apps & Fusion DBA
I discussed about certificates in 10g WebGate expiry after 365 days and fix is to re-configure WebGate that will generate new certificate for one year (To change duration of certificate update default_days in $WEBGATE_HOME/oblix/tools/openssl/ openssl.cnf ) Certificates for WebGates are stored in file with PEM extension. You can open PEM file to view validity of certificate using opensssl as shown below openssl […]
Computer users tend to amass a lot of data over the years, whether it's important personal projects, digital photos, videos, music, or code repositories. While hard drives tend to be pretty big these days, sometimes you have to step back and take stock of what you're actually storing on your drives.