Articles and News

The Cost of Cloud, a Trillion Dollar Paradox

»You’re crazy if you don’t start in the cloud; you’re crazy if you stay on it.«

#cloud #cloud-cost

Where Text Protocols Came From, and Why They’re Not Going Anywhere

In this post, the author shows that even if not always the most efficient solution, there still are use-cases where human-readable protocols still shine.

#protocol #uuencode

Mobile Device Best Practices

#nsa #mobile-device-security

From Stolen Laptop to Inside the Company Network

Even a laptop following security best practices does not keep attackers from exploiting it. In this case, a TPM secured, FDE SSD was targeted.

#hardware-security #tpm

Kernel Pwning with eBPF: A Love Story

This blog post provides the reader with an in-depth look at eBPF and its security implications in general and details of the specific bug CVE-2021-3490.

#ebpf #ebpf-security

Top Routinely Exploited Vulnerabilities

»Four of the most targeted vulnerabilities in 2020 affected remote work, VPNs, or cloud-based technologies.«

Syslog-ng 3.33: The MQTT Destination

Syslog-ng is now able to send log messages to an MQTT broker.

#syslog-ng #mqtt

Netcat - All You Need to Know


ENISA Telecom Security Incidents 2020 - Annual Report

Of the 170 registered incidents in 2020, 50 % were caused by system failures, 40 % by human errors, 7 % by natural phenomena, and 2 % by malicious actions.

#enisa #telecom-security

Sysadmins: Why Not Simply Verify There’s No Backdoor in Every Program You Install, and Thus Avoid Any Cyber-Drama?

In this article, Gareth Corfield comments on ENISA’s supply chain attack report.


IBM’s z/OS Update for Mainframes About to Land

This article summarizes the information on the upcoming z/OS 2.5 release.

#ibm #z-os #mainframe

5000x faster CRDTs: An Adventure in Optimization

The author explains how he optimized the performance of conflict-free replicated data types.

#cfrd #distributed-systems

You Really Shouldn’t Roll Your Own Crypto

An empirical study of vulnerabilities in cryptographic libraries.

#security #cryptographic-library

Project and Releases

Grml 2021.07

Version 2021.07 of the Debian-based live system, primarily targeted at system administrators, was released.

#grml #type:release

FreeBSD Status Report Q2 2021

Amongst other news, the report for Q2 contains information on:

  • A new, web-based installer.
  • LLDB Debugger Improvements.
  • Update of the Linux compatibility layer.
  • pf syncookie support.
  • The RAIDZ expansion update
  • helloSystem



»Szyszka is a simple but powerful and fast bulk file renamer.«



»If you like the interface of HTTPie but miss the features of curl, curlie is what you are searching for.«

#curl #http #web-development


Distribution-independent installer framework.


Refined Blog

List of personal blogs focusing on software.



The Linux Command Line

#book #command-line