Links
AddSafeStack founder Laura Bell Main shares the cybersecurity lessons she's learned after many years deep inside high-growth companies.
Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.
Generate high-quality images from text prompts using Flux Dev, a 12B parameter rectified flow transformer. Ideal for research, creative projects, and fine-tuning.
Cloud Router Switch 112-8P-4S-IN with QCA8511 400Mhz CPU, 128MB RAM, 8xGigabit LAN with PoE-out, 4xSFP, RouterOS L5, desktop case, PSU
I work from home everyday, I am susceptible to eye strain, eye pain, and dizziness. Having a working environment that’s as easy on my eyes as possible is of critical importance. I'd like to share what I've learned over the years in hopes that it can be helpful to you if you work from home, and like many, have experienced WFH eye strain.
Over the past couple of weeks, Cloudflare's DDoS protection systems have automatically and successfully mitigated multiple hyper-volumetric L3/4 DDoS attacks exceeding 3 billion packets per second (Bpps). Our systems also automatically mitigated multiple attacks exceeding 3 terabits per second (Tbps), with the largest ones exceeding 3.65 Tbps. The scale of these attacks is unprecedented.
Discover 10 design patterns from the Kubernetes Patterns book that will help you follow basic Kubernetes concepts and design Kubernetes-based applications.
Git 2.46 is here with new features like pseudo-merge bitmaps, more capable credential helpers, and a new git config command. Check out our coverage on some of the highlights here.
A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active.
Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake. - brimdata/zui
Ransomware is one of the biggest scourges we face as Internet citizens today. What happens when you have been struck by it? The most obvious option would be to pay the ransom. You would not be alone if you did – even lar…
Pain-free Python dependencies in clusters with uv + Ray! Learn how to build lightning-fast, consistent environments for distributed applications.
European organizations are going all in for digital sovereignty with open source tools.
The latest tips, tutorials, new, and release info about Elasticsearch, Kibana, Beats, and Logstash...
It's arguably better than Obsidian Sync, too.
Palo Alto Networks warned customers today to patch security vulnerabilities (with public exploit code) that can be chained to let attackers hijack PAN-OS firewalls.
This has been a very long time coming, but finally, after a marathon effort, the brand new Have I Been Pwned website is now live!
Feb last year is when I made the first commit to the public repo for the rebranded service, and we soft-launched the new brand in
September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. December 2, 2019: Since the author wrote this post, AWS Single Sign On (AWS IAM Identity Center) has launched native features that simplify using […]
June 15, 2020: This blog is out of date. Please refer here for the updated info: https://aws.amazon.com/blogs/aws/new-enhanced-amazon-macie-now-available/ Amazon Macie is a security service that makes it easy for you to discover, classify, and protect sensitive data in Amazon Simple Storage Service (Amazon S3). Macie collects AWS CloudTrail events and Amazon S3 metadata such as permissions […]
Put away your word processor and start writing from the command line using these open source tools.