Articles and News
The Cost of Cloud, a Trillion Dollar Paradox
»You’re crazy if you don’t start in the cloud; you’re crazy if you stay on it.«
Where Text Protocols Came From, and Why They’re Not Going Anywhere
In this post, the author shows that even if not always the most efficient solution, there still are use-cases where human-readable protocols still shine.
Mobile Device Best Practices
From Stolen Laptop to Inside the Company Network
Even a laptop following security best practices does not keep attackers from exploiting it. In this case, a TPM secured, FDE SSD was targeted.
Kernel Pwning with eBPF: A Love Story
This blog post provides the reader with an in-depth look at eBPF and its security implications in general and details of the specific bug CVE-2021-3490.
Top Routinely Exploited Vulnerabilities
»Four of the most targeted vulnerabilities in 2020 affected remote work, VPNs, or cloud-based technologies.«
Syslog-ng 3.33: The MQTT Destination
Syslog-ng is now able to send log messages to an MQTT broker.
Netcat - All You Need to Know
ENISA Telecom Security Incidents 2020 - Annual Report
Of the 170 registered incidents in 2020, 50 % were caused by system failures, 40 % by human errors, 7 % by natural phenomena, and 2 % by malicious actions.
Sysadmins: Why Not Simply Verify There’s No Backdoor in Every Program You Install, and Thus Avoid Any Cyber-Drama?
In this article, Gareth Corfield comments on ENISA’s supply chain attack report.
IBM’s z/OS Update for Mainframes About to Land
This article summarizes the information on the upcoming z/OS 2.5 release.
#ibm #z-os #mainframe
5000x faster CRDTs: An Adventure in Optimization
The author explains how he optimized the performance of conflict-free replicated data types.
You Really Shouldn’t Roll Your Own Crypto
An empirical study of vulnerabilities in cryptographic libraries.
Project and Releases
Version 2021.07 of the Debian-based live system, primarily targeted at system administrators, was released.
FreeBSD Status Report Q2 2021
Amongst other news, the report for Q2 contains information on:
- A new, web-based installer.
- LLDB Debugger Improvements.
- Update of the Linux compatibility layer.
- The RAIDZ expansion update
»Szyszka is a simple but powerful and fast bulk file renamer.«
»If you like the interface of HTTPie but miss the features of curl,
curlie is what you are searching for.«
#curl #http #web-development
Distribution-independent installer framework.
List of personal blogs focusing on software.
The Linux Command Line