Azure AD Authentication to Azure VM

Many organizations are adopting a cloud only approach to infrastructure. Why wouldn’t they? It’s scalable with predictable costs, and it can be accessed from virtually anywhere. However, authenticating with services and virtual machines on the cloud...

Fundamental Issues with IT Security

You don't have to look far to find yet another news story about a company or organization getting breached or hacked in some way. According to the Identity Theft Resource Center, by September 30, 2021 the number of data breaches had already exceeded...

Navigating Mobile Device Security

We are fortunate to live at such a time, when so much technology exists to make our lives easier, or more convenient. Unfortunately, we also live at a time when vulnerabilities in these systems is exploited by, and for the benefit of, bad actors....

Active Directory Authenticated CIFS(Samba) File Sharing w/Ubuntu 20.04

A while back, we looked at setting up a CentOS 8 CIFS file server with Active Directory Authentication. This blog will go through the same exercise, except using Ubuntu Linux 20.04 LTS. While there are many approaches to making this setup work, we...

Linux Version 8 On Windows Subsystem for Linux

*This Blog is an updated version to the previously published blog Centos Linux Version 8 on Windows Subsystem for Linux

Last year we looked at installing CentOS 8 on Windows 10 WSL. In the past year, there have been many changes to both CentOS and...

Subscribe Here For Our Blogs:

Recent Posts

Categories

see all