YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Ansible
    • Bash Scripting
    • Docker
    • Linux Crash Course
    • Linux Essentials
    • Netdata
    • OpenStack
    • Proxmox VE
    • Tmux
    • vim
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 48 – New Malware, Old Vulnerabilities

    While it’s certainly never a good thing to become the victim of a cyber-attack, it can be even more embarrassing if the CVE the threat actor used to get a foothold into your systems was patched a long time ago. In this episode, Jay and Joao discuss malware that’s currently taking advantage of vulnerabilities that were patched over a year ago! As important as software updates happen to be, why are so many organizations unable to keep up with them?

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file)
    • Ogg version

    Relevant Articles

    • Shikitega – New stealthy malware targeting Linux

    ⇨

    Read more: Enterprise Linux Security Episode 48 – New Malware, Old Vulnerabilities
  • Enterprise Linux Security Episode 20 – Cloud Governance

    Cloud Computing is all the rage these days – but what happens when a company moves to the cloud to quickly? While cloud computing can be a very rewarding technology, it can also get out of hand quite quickly. In this video, Joao and Jay discuss the concept of Cloud Governance, something that any organization that utilizes the cloud can (and should) take advantage of.

    YouTube player

    Download links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    Relevant links

    • Cloud governance article

    ⇨

    Read more: Enterprise Linux Security Episode 20 – Cloud Governance
  • Enterprise Linux Security Episode 19 – The 2021 RBS Year-End Vulnerability Report

    2021 is now in the past, but there’s some very interesting details in the year-end vulnerability report produced by RBS. These details give us a look at some of the trends that will impact 2022 and beyond. In this episode, Joao and Jay discuss the report and some of its findings.

    YouTube player

    Download links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    Relevant links

    • The RBS 2021 Year-End Vulnerability Report

    ⇨

    Read more: Enterprise Linux Security Episode 19 – The 2021 RBS Year-End Vulnerability Report
  • Enterprise Linux Security Episode 17 – Polkit & LUKS CVE’s

    The New Year is just beginning, and we already have a few important CVE’s to discuss, this time around Polkit and LUKS. The CVE numbers for these vulnerabilities are CVE-2021-4034 and CVE-2021-4122 respectively. In this episode, Jay and Joao discuss these vulnerabilities.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    Relevant links

    • Polkit CVE-2021-4034
    • LUKS CVE-2021-4122

    ⇨

    Read more: Enterprise Linux Security Episode 17 – Polkit & LUKS CVE’s
  • Enterprise Linux Security Episode 15 – High Availability

    It’s frustrating when critical infrastructure encounters an issue that results in a disruption of service. High Availability is a concept that aims to help alleviate (or hopefully eliminate) such downtime, and is a very attractive goal for system administrators. In this episode, Jay and Joao discuss high availability, as well as its pros and cons.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    Related articles

    • Log4Shell evolution of evasion patterns
    • Log4Shell Variants and updates

    ⇨

    Read more: Enterprise Linux Security Episode 15 – High Availability
  • Enterprise Linux Security Episode 13 – Log4Shell

    The Log4Shell vulnerability is making its rounds all over security news sites, and with good reason – it’s quite easy to execute. In this episode, Jay and Joao discuss the vulnerability that exists within log4j, as well as some ways to keep your server safe.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 13 – Log4Shell
  • Enterprise Linux Security Episode 6 – Image Defaults

    Although there’s no such thing as a “perfect” deployment image, including some sane defaults into your images and templates can save you a lot of work down the road, and also give you the opportunity to include more secure defaults. In this episode, we’ll discuss deployment image defaults as well as some recent news.

    YouTube player
    • OGG version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 6 – Image Defaults
  • Enterprise Linux Security Episode 3 – Linux Distro Migrations

    Migrating your servers from one Linux distribution to another can be a daunting task, even moreso if it’s a migration you’re doing because of unforeseen events or changes within the ecosystem. In this video, Jay and Joao discuss the challenges when it comes to migrating Linux distributions, and the effect this has on security.

    YouTube player

    Ogg version

    MP3 version

    MP3 version (low)

    OS Migration Checklist

    ⇨

    Read more: Enterprise Linux Security Episode 3 – Linux Distro Migrations
  • Live-patching QEMU with QEMUCare

    Rebooting is a pain, and in some organizations, downright tedious. Shuffling virtual machines between hosts in a cluster is even more tedious, and when it’s time to install patches, that’s what many administrators are forced to do. In this video, I check out QEMUCare, which aims to live-patch QEMU to avoid VM shuffling. In particular, we’ll look at installing ePortal (which deploys the patches) and also an example scenario.

    YouTube player
    (more…)

    ⇨

    Read more: Live-patching QEMU with QEMUCare
  • Enterprise Linux Security – Episode 02: Attack Vectors

    YouTube player

    ⇨

    Read more: Enterprise Linux Security – Episode 02: Attack Vectors
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.