Tux Machines
Posted by Roy Schestowitz on Aug 10, 2023
=> 'Linux' Foundation, Microsoft, and More Proprietary Software | Security Leftovers
=> ↺ Fedora Community Blog: Matrix to libera.chat (IRC) bridge unavailable
The Fedora project has been moving to Matrix for our interactive chat needs for a while, but we wanted to make any such transition smooth and not leave behind users that preferred IRC for whatever reasons. When we setup Matrix rooms we also setup a portal using the Matrix<->libera.chat IRC bridge. This allows Matrix and IRC users to see the same content and interact with each other. There have of course been issues from time to time of dropped messages, or clashes between the Matrix and IRC cultures, but overall it’s been a great help to keeping our community from fragmenting.
Unfortunately, issues with the bridge have reached a point that libera.chat folks have asked for the bridge to be taken down until it can be fixed up. This happened at 2023-08-06 14UTC.
=> ↺ Madeline Peck: EDA and the Three Dwarves
What a long journey this coloring book has gone on! This blog post has been sitting in my drafts for over a year and I thought it was finally time to publish it.
If you’re not aware of the previous coloring books, they have been a series of projects started by Máirín Duffy and Dan Walsh to increase awareness and convey a better understanding of different technology.
For example, ‘The Container Coloring Book: Who’s Afraid of the Big Bad Wolf?’ is a coloring book where the three little pigs teach you how to keep the big bad wolf from blowing your container-based applications down. The book covers security, management, resource control, namespaces, and much more that people should keep in mind when creating their own applications with containers.
=> ↺ ‘The Container Coloring Book: Who’s Afraid of the Big Bad Wolf?’
All of the past (and hopefully future coloring books too!) are kept here at www.red.ht/coloring
=> ↺ previous coloring books | ↺ ‘The Container Coloring Book: Who’s Afraid of the Big Bad Wolf?’ | ↺ www.red.ht/coloring
In this blog posts, we’ll dive into adapting your Ansible code made for CentOS to openSUSE Leap, ensuring seamless compatibility. In this first part, we provided advice and a general introduction to ease your way into the process. In this second part, we’ll delve into practical examples of troubleshooting and adapting existing roles.
=> ↺ The State of Edge Security Report
Edge computing has grown from being a niche use case in a handful of industries to offering a major opportunity for enterprises across industries to spread compute power around the world (or universe, as in the case of workloads in space). Edge computing slashes latency times by processing data where the data is being collected, or when it might otherwise be impossible to process because a workload or piece of hardware is disconnected from the network.
=> ↺ Hardening SSH connections to managed hosts with Red Hat Ansible Automation Platform
Red Hat Ansible Automation Platform is a platform for implementing enterprise-wide automation, which makes it an ideal tool for your security audits. Security has many layers, but this article focuses on mitigating SSH attacks on managed hosts. While you can't eliminate all security risks, you can harden managed hosts to minimize some of them (especially brute force attacks), and mitigate others (by allowing SSH connections only from authorized hosts, enforcing sudo, and so on).
=> ↺ IBM researchers trick AI chatbots into helping with hacks
Tricking generative AI to help conduct scams and cyberattacks doesn't require much coding expertise, new research shared exclusively with Axios warns.
=> ↺ AI | ↺ cyberattacks
=> ↺ AI | ↺ cyberattacks
=> ↺ The process of migrating Java applications
The migration process is cumbersome, to say the least. The root cause for this can be associated with the ambiguity about the differences that may exist between two vantage points (i.e., origin and destination). Hence in the absence of a knowledgeable, tried, and tested roadmap, one simply cannot identify the gaps that are to be bridged while moving from origin to the destination. Same goes for software migration. A software migration process must factor in the changes it expects to undergo while migrating (i.e., downgrading, upgrading, or switching between two different and/or compatible/incompatible versions of the same or different brands). The key to success for such a venture lies in knowing the unknowns alongside their respective impact to its surroundings. Only then can an effective list of changes be identified and implemented.
=> gemini.tuxmachines.org This content has been proxied by September (ba2dc).Proxy Information
text/gemini;lang=en-GB