Google has open sourced Seesaw, a Linux-based load balancing system written with Go programming language.
Some time ago, Google used two different load balancing systems, but after registering both management and stability issues, they decided to develop their own solution: Seesaw.
This software enables to “increase service availability and reduce management” overhead, explains Joel Sing, Google Site Reliability Engineer
New vulnerabilities emerge every day, threatening enterprise information security. In order to avoid data and devices getting infected, it is important to find them out early so they can be fixed as soon as possible.
There are Open Source tools which can help to identify vulnerabilities, such as web servers and applications scanners, analysis tools, fuzzers… Below you can find a useful selection:
The first Kali Linux Rolling Edition is available after 5 months of testing, featuring the stability of Debian together with the latest versions of many outstanding penetration testing tools created by the information security community.
This new model of release feeds continuously from Debian testing, so the kali-rolling repository will always hold the latest stable releases of monitored tools after 24-48 hours being released.
Thousands of Open Source and free softwaredevelopers from all over the world will meet very soon at FOSDEM 2016 to share ideas, collaborate and discuss about latest and future trends.
This free event organized by and for the community will take place on Saturday 30 and Sunday 31 January 2016 in Brussels. The goal is to promote and widespread the use of free and Open Source software.
Security experts have discovered a critical vulnerability in OpenSSH which affects versions from 5.4 to 7.1 and it allows attackers to steal encrypted private keys.
A new OpenSSH version has been released to patch this vulnerability, so it is strongly recommended to update to this new release. Another option is to deactivate the vulnerable code adding “UseRoaming no” option in ssh_config file.
During the last weeks, the most read topics in our blog have been our list of Linux predictions for 2016, the video which shows the deployment of virtual desktops with UDS Enterprise & Nutanix Acropolis and the reasons to adopt desktop virtualization this year.
Find below the links to the posts on these topics just in case you haven’t read them yet:
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.