YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 21 – Dirty Pipe & Nvidia’s Breach

    In the 21st episode of Enterprise Linux Security, Jay and Joao discuss the recent “Dirty Pipe” vulnerability, as well as Nvidia’s recent breach.

    YouTube player

    Download

    • MP3 version
    • MP3 version (low)
    • Ogg version

    Relevant links:

    • Dirty pipe (CVE-2022-0847) article
    • ZDNet article for CVE-2022-0847
    • TechCrunch article regarding Nvidia’s recent breach

    ⇨

    Read more: Enterprise Linux Security Episode 21 – Dirty Pipe & Nvidia’s Breach
  • The Log4Shell Vulnerability, and CrowdSec’s Community Response

    TheLog4Shell vulnerability is taking the Internet by storm, and it’s already being used for real-world attacks. In this video, Jay discusses the details around Log4Shell vulnerability in Log4j, and also CrowdSec’s community-based response to the situation.

    YouTube player

    Relevant links:

    • CVE information
    • Rapid7 article
    • Tech Republic Article (includes test script)
    • DataDog article
    • Github IP list for this CVE
    • CrowdSec pull request #311
    • CrowdSec YAML code
    • CrowdSec http-cve collection

    ⇨

    Read more: The Log4Shell Vulnerability, and CrowdSec’s Community Response
  • Enterprise Linux Security Episode 8 – Trojan Source, & CISA’s Directive

    Recently, some interesting security news has occurred, and two specific developments are the main discussion in this episode. Trojan Source is a newly discovered tactic that can be used to hide malicious code and execute something completely unexpected, even when the source code appears to be syntactically correct. In addition, CISA recently mandated a large number of CVE’s to be patched in the very near future, which will likely have ramifications even outside of the United States. Also, Jay and Joao also discuss the recently released Fedora 35, which is a distribution that has a large presence on the workstations that administrators use.

    YouTube player

    Episode downloads

    • OGG version
    • MP3 version
    • MP3 version (low)

    Episode-specific Links

    • Trojan Source
    • CISA (BOD) 22-01 Directive (ZDNet Coverage)
    • CISA (BOD) 22-01 Directive (cisa.gov)
    • CISA (BOD) 22-01 Vulnerabilities Catalog

    ⇨

    Read more: Enterprise Linux Security Episode 8 – Trojan Source, & CISA’s Directive
  • The Homelab Show Episode 32 – Linux Patch Management

    In episode 32 of The Homelab Show, Tom & Jay discuss Patch Management, including (but not limited to) unattended upgrades, live patching, and more!

    YouTube player

    ⇨

    Read more: The Homelab Show Episode 32 – Linux Patch Management
  • Enterprise Linux Security Episode 3 – Linux Distro Migrations

    Migrating your servers from one Linux distribution to another can be a daunting task, even moreso if it’s a migration you’re doing because of unforeseen events or changes within the ecosystem. In this video, Jay and Joao discuss the challenges when it comes to migrating Linux distributions, and the effect this has on security.

    YouTube player

    Ogg version

    MP3 version

    MP3 version (low)

    OS Migration Checklist

    ⇨

    Read more: Enterprise Linux Security Episode 3 – Linux Distro Migrations
  • Live-patching QEMU with QEMUCare

    Rebooting is a pain, and in some organizations, downright tedious. Shuffling virtual machines between hosts in a cluster is even more tedious, and when it’s time to install patches, that’s what many administrators are forced to do. In this video, I check out QEMUCare, which aims to live-patch QEMU to avoid VM shuffling. In particular, we’ll look at installing ePortal (which deploys the patches) and also an example scenario.

    YouTube player
    (more…)

    ⇨

    Read more: Live-patching QEMU with QEMUCare
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.