YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 83 – Questions and Answers

    Should you use a base image or use a configuration management solution? What about running a NAS in the cloud? Those are just a few of the questions asked by the audience, and in this episode, Jay and Tom share their thoughts on your queries.

    YouTube player

    ⇨

    Read more: Enterprise Linux Security Episode 83 – Questions and Answers
  • Enterprise Linux Security Episode 51 – Samba in the Kernel, What Could Possibly Go Wrong?!

    Adding unnecessary components to the Kernel is generally a bad idea, as it increases its threat surface. In this episode, Jay and Joao discuss a recent story that’s a perfect example of why it’s important to keep this under control. A vulnerability was recently discovered in the Linux kernel that scored the highest possible rating, and it all started when ksmbd was added.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (smaller file, lower bitrate)
    • Ogg version

    Relevant Articles

    • Southwest Meltdown Shows Airlines Need Tighter Software Integration
    • Ohio court: Non-physical software damage in ransomware attack not covered under insurance
    • Will this CVSS 10 Linux Kernel vuln ruin your holiday?

    ⇨

    Read more: Enterprise Linux Security Episode 51 – Samba in the Kernel, What Could Possibly Go Wrong?!
  • Enterprise Linux Security Episode 50 – The Many Faces of Patching

    When it comes to patching, were you aware that there’s more than one type of patch? In this episode of Enterprise Linux Security, Jay and Joao discuss the various types of patching that’s performed today.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file)
    • Ogg version

    Relevant Articles

    • The Many Faces of Patching

    ⇨

    Read more: Enterprise Linux Security Episode 50 – The Many Faces of Patching
  • The Homelab Show Episode 81: Building Lab Templates and Images

    When building a new virtual or physical server, doing everything manually is a waste of time. With an image or template, you can have some of your recurring tasks already set up on the image – and then every instance you create from that template will have all of those tweaks already made. But how far should you go with this default setup? What are some of the caveats that you might run into? In this episode, Jay and Tom discuss creating server images/templates and the related shenanigans you may run into while doing so.

    YouTube player

    ⇨

    Read more: The Homelab Show Episode 81: Building Lab Templates and Images
  • Enterprise Linux Security Episode 48 – New Malware, Old Vulnerabilities

    While it’s certainly never a good thing to become the victim of a cyber-attack, it can be even more embarrassing if the CVE the threat actor used to get a foothold into your systems was patched a long time ago. In this episode, Jay and Joao discuss malware that’s currently taking advantage of vulnerabilities that were patched over a year ago! As important as software updates happen to be, why are so many organizations unable to keep up with them?

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file)
    • Ogg version

    Relevant Articles

    • Shikitega – New stealthy malware targeting Linux

    ⇨

    Read more: Enterprise Linux Security Episode 48 – New Malware, Old Vulnerabilities
  • The Homelab Show Episode 80 – The “Automation” Mindset

    As most of us homelabbers are aware by now, automation is a very good thing – repeating (and sometimes tedious) tasks can be automated, allowing us to focus on things that are better uses of our time. But Automation itself seems to have its own mindset, especially when it comes to how you go about approaching some of the challenges. In this episode, Jay and Tom discuss the Automation Mindset.

    YouTube player

    ⇨

    Read more: The Homelab Show Episode 80 – The “Automation” Mindset
  • The Homelab Show Episode 78 – Changelog

    There’s all kinds of software choices when it comes to your homelab, and in this episode, Jay and Tom discuss some recent releases of some of the platforms that are very common with homelabbers. This discussion includes some thoughts on the new release of Fedora, Proxmox, and more!

    YouTube player

    ⇨

    Read more: The Homelab Show Episode 78 – Changelog
  • The Homelab Show Episode 77 – /dev/random, Mastodon & More

    There’s a lot to talk about in this episode! Topics include Mastodon and some information on what it is and how to set it up, as well as additional topics around owning your media. Definitely a can’t miss episode!

    YouTube player

    ⇨

    Read more: The Homelab Show Episode 77 – /dev/random, Mastodon & More
  • Enterprise Linux Security Episode 44 – Is Linux less of a Target?

    In this episode, Jay and Joao discuss how much of a target Linux is, as well as some myths surrounding Linux and security. Also, there will be some news updates as well.

    YouTube player

    Relevant Articles

    • White House Releases Software Supply Chain Security Guidance
    • White House Supply Chain Memo (PDF)

    Download Links

    • MP3 version (normal quality)
    • MP3 version (lower quality, smaller file)
    • Ogg version (normal quality)

    ⇨

    Read more: Enterprise Linux Security Episode 44 – Is Linux less of a Target?
  • Enterprise Linux Security Episode 39 – Publicly Available RDP, What Could Go Wrong?!

    What happens when you open up the Remote Desktop Protocol (RDP) to the public Internet? Definitely some shenanigans, that’s what. In this episode, Jay and Joao discuss some recent news, which includes a company that made the mistake of making RDP available to everyone, multiple crypto-malware infections at the same time, and other news.

    YouTube player

    Relevant Links

    • Multiple threat actors encrypting files at the same time
    • Cisco Talos shares insights related to recent cyber attack on Cisco

    Download Links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 39 – Publicly Available RDP, What Could Go Wrong?!
  • Enterprise Linux Security Episode 35 – Top 25 Dangerous Software Weaknesses

    In this episode, Jay and Joao discuss a recent report that identifies the “Top 25 most dangerous software weaknesses.” This list includes the usual suspects, as well as some very interesting findings as well. In addition, the descriptions of the common weaknesses serves as a good jumping in point if you’re new to this podcast.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate)
    • Ogg version

    Relevant Articles

    • 2022 CWE Top 25 Most Dangerous Software Weaknesses

    ⇨

    Read more: Enterprise Linux Security Episode 35 – Top 25 Dangerous Software Weaknesses
  • Enterprise Linux Security Episode 32 – MySQL for Everyone!

    Are you a fan of MySQL? What if we told you that there’s an infinite supply of it online, right out in the open?! It’s literally as bad as it sounds! In this episode, Jay and Joao discuss how over 3.6 million MySQL instances are publicly available, as well as other forms of unintended public access.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate)
    • Ogg version

    Relevant Articles

    • Over 3.6 million MySQL servers found exposed on the Internet

    ⇨

    Read more: Enterprise Linux Security Episode 32 – MySQL for Everyone!
Previous Page
1 2 3 4 5 6 … 8
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.