Server: CentOS, MitM, Ceph, Kubernetes and Linux Bashing
-
Learn CentOS Part 11 - Installing and removing Packages
In the "Learn CentOS" series, you'll learn all the skills you'll need to know to manage real servers and get you on your way to mastering the art of Linux administration.
-
How to avoid man-in-the-middle cyber attacks
Remember, you don't have to click anything online right away, and you don't have to follow random people's instructions, no matter how urgent they may seem. The internet will still be there after you step away from the computer and verify the identity of a person or site demanding your attention.
While MITM attacks can happen to anyone, understanding what they are, knowing how they happen, and actively taking steps to prevent them can safeguard you from being a victim.
-
Another perspective on Swift versus Ceph today
Mark's perspective is largely founded in the fault tolerance and administrative overhead. However, let's a look at "keep using [Ceph] for object too".
Indeed the integration of block, POSIX, and object storage is Ceph's strength, although I should note for the record that Ceph has a large gap: all 3 APIs live in separate namespaces. So, do not expect to be able to copy a disk snapshot through CephFS or RGW. Objects in each namespace are completely invisible to two others, and the only uniform access layer is RADOS. This is why, for instance, RGW-over-NFS exists. That's right, not CephFS, but NFS. You can mount RGW.
All attempts at this sort of integration that I know in Swift always start with a uniform access first. It the opposite of Ceph in a way. Because of that, these integrations typically access from the edge inside, like making a pool that a daemon fills/spills with Swift, and mounting that. SwiftStacks's ProxyFS is a little more native to Swift, but it starts off with a shared namespace too.
-
API Priority and Fairness Alpha
This blog describes “API Priority And Fairness”, a new alpha feature in Kubernetes 1.18. API Priority And Fairness permits cluster administrators to divide the concurrency of the control plane into different weighted priority levels. Every request arriving at a kube-apiserver will be categorized into one of the priority levels and get its fair share of the control plane’s throughput.
-
BlackBerry: Chinese cybercriminals target high-value Linux servers with weak defenses [Ed: To CBS, servers that are improperly maintained or set up are "Linux"; if it's something Windows, they won't even specify the platform and won't blame Microsoft.]
- Login or register to post comments
- Printer-friendly version
- 4517 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
More of this FUD
Linux Security: Chinese State Hackers May Have Compromised ‘Holy Grail’ Targets Since 2012 [Ed: Davey Winder and other Microsoft propagandists (long history) knocking very hard with GNU/Linux FUD at the moment, perpetuating the idea "Linux" is dangerous because some people set it up the wrong way (misconfigured), don't patch etc.]
When ZDNet covers "Linux"...
These hackers have been quietly targeting Linux servers for years
The headlines that omit Windows
Linux Servers Under Attack for a Decade
Not blaming just "Linux"
BlackBerry uncovers hacker tools that it says opened data servers for a decade
More of this and beyond
Chinese Cybercriminals Target High-Value Linux Servers With Weak Defenses: BlackBerry
Hacking campaign puts Linux servers at risk of attack
Meet dark_nexus, quite possibly the most potent IoT botnet ever
Dark Nexus: evolving IoT botnet targets variety of devices
Dark Nexus: evolving IoT botnet targets variety of devices
More on BlackBerry
BlackBerry uncovers China-backed hacking campaign on Linux servers
APTs infiltrated Linux servers undetected for nearly 10 years
Want to stay under the radar for a decade or more?
Want to stay under the radar for a decade or more? This Chinese hacking crew did it... by aiming for Linux servers