YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Ansible
    • Bash Scripting
    • Docker
    • Linux Crash Course
    • Linux Essentials
    • Netdata
    • OpenStack
    • Proxmox VE
    • Tmux
    • vim
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 18 – Zero Trust Security

    Trust is a very important aspect of security, but who/what exactly should you trust? How about no one? Join Jay and Joao for episode 18 of the Enterprise Linux Security show, as they discuss Zero Trust Security.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 18 – Zero Trust Security
  • Enterprise Linux Security Episode 17 – Polkit & LUKS CVE’s

    The New Year is just beginning, and we already have a few important CVE’s to discuss, this time around Polkit and LUKS. The CVE numbers for these vulnerabilities are CVE-2021-4034 and CVE-2021-4122 respectively. In this episode, Jay and Joao discuss these vulnerabilities.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    Relevant links

    • Polkit CVE-2021-4034
    • LUKS CVE-2021-4122

    ⇨

    Read more: Enterprise Linux Security Episode 17 – Polkit & LUKS CVE’s
  • Enterprise Linux Security Episode 16 – Library Poisoning

    We’ve discussed supply-chain attacks in the past, and now it’s time to see an actual example that happened recently. However, this particular incident is especially unique as the libraries in question were allegedly poisoned by the actual developer. In this episode, Joao and Jay discuss the recent sabotage regarding two very popular NPM libraries.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 16 – Library Poisoning
  • Enterprise Linux Security Episode 15 – High Availability

    It’s frustrating when critical infrastructure encounters an issue that results in a disruption of service. High Availability is a concept that aims to help alleviate (or hopefully eliminate) such downtime, and is a very attractive goal for system administrators. In this episode, Jay and Joao discuss high availability, as well as its pros and cons.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    Related articles

    • Log4Shell evolution of evasion patterns
    • Log4Shell Variants and updates

    ⇨

    Read more: Enterprise Linux Security Episode 15 – High Availability
  • Enterprise Linux Security Episode 14 – Recovering from Disasters

    Disasters in the world of tech are frustrating for everyone, not just the company that experienced the incident. In this episode, Jay and Joao discuss thoughts around what it actually means to recovery from a disaster, and why it’s typically not a quick process.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 14 – Recovering from Disasters
  • Enterprise Linux Security Episode 9 – DevOps

    DevOps has changed the way many technology organizations work, by making the administrator the center of the development cycle (rather than an outside resource). In this episode, Jay and Joao discuss DevOps and how it’s changed the landscape.

    YouTube player
    • OGG version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 9 – DevOps
  • Enterprise Linux Security Episode 8 – Trojan Source, & CISA’s Directive

    Recently, some interesting security news has occurred, and two specific developments are the main discussion in this episode. Trojan Source is a newly discovered tactic that can be used to hide malicious code and execute something completely unexpected, even when the source code appears to be syntactically correct. In addition, CISA recently mandated a large number of CVE’s to be patched in the very near future, which will likely have ramifications even outside of the United States. Also, Jay and Joao also discuss the recently released Fedora 35, which is a distribution that has a large presence on the workstations that administrators use.

    YouTube player

    Episode downloads

    • OGG version
    • MP3 version
    • MP3 version (low)

    Episode-specific Links

    • Trojan Source
    • CISA (BOD) 22-01 Directive (ZDNet Coverage)
    • CISA (BOD) 22-01 Directive (cisa.gov)
    • CISA (BOD) 22-01 Vulnerabilities Catalog

    ⇨

    Read more: Enterprise Linux Security Episode 8 – Trojan Source, & CISA’s Directive
  • Enterprise Linux Security Episode 7 – ELevate

    Remaining on legacy Linux distributions can lead to additional security risks as time goes on, and migrating to a newer and better supported distribution can be a very difficult endeavor for most administrators. In this episode, Jay and Joao are joined by Jack from AlmaLinux, and we talk about ELevate – a tool that can be used to migrate from a distribution in the Enterprise Linux family to another Enterprise Linux distribution. This helps alleviate some of the burden of distro migration, and as a community project it’s also a great project to get started with contributing to an open-source project.

    YouTube player

    Episode downloads

    • OGG version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 7 – ELevate
  • Enterprise Linux Security Episode 6 – Image Defaults

    Although there’s no such thing as a “perfect” deployment image, including some sane defaults into your images and templates can save you a lot of work down the road, and also give you the opportunity to include more secure defaults. In this episode, we’ll discuss deployment image defaults as well as some recent news.

    YouTube player
    • OGG version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 6 – Image Defaults
  • Enterprise Linux Security Episode 4 – Supply Chain Attacks

    When you write software, there’s no reason to reinvent the wheel – shared libraries and other resources exist to enable you to create applications while avoiding redundant work. Unfortunately, sometimes the software supply itself chain is attacked, which would mean that your application contain malware or security threats you didn’t account for. In this episode of Enterprise Linux Security, Joao and I discuss supply chain attacks, as well as some ways to mitigate this threat.

    YouTube player
    (more…)

    ⇨

    Read more: Enterprise Linux Security Episode 4 – Supply Chain Attacks
  • Enterprise Linux Security Episode 3 – Linux Distro Migrations

    Migrating your servers from one Linux distribution to another can be a daunting task, even moreso if it’s a migration you’re doing because of unforeseen events or changes within the ecosystem. In this video, Jay and Joao discuss the challenges when it comes to migrating Linux distributions, and the effect this has on security.

    YouTube player

    Ogg version

    MP3 version

    MP3 version (low)

    OS Migration Checklist

    ⇨

    Read more: Enterprise Linux Security Episode 3 – Linux Distro Migrations
  • Enterprise Linux Security – Episode 02: Attack Vectors

    YouTube player

    ⇨

    Read more: Enterprise Linux Security – Episode 02: Attack Vectors
Previous Page
1 … 5 6 7 8
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.