Many organizations are adopting a cloud only approach to infrastructure. Why wouldn’t they? It’s scalable with predictable costs, and it can be accessed from virtually anywhere. However, authenticating with services and virtual machines on the cloud...
Azure AD Authentication to Azure VM
Fundamental Issues with IT Security
You don't have to look far to find yet another news story about a company or organization getting breached or hacked in some way. According to the Identity Theft Resource Center, by September 30, 2021 the number of data breaches had already exceeded...
Navigating Mobile Device Security
We are fortunate to live at such a time, when so much technology exists to make our lives easier, or more convenient. Unfortunately, we also live at a time when vulnerabilities in these systems is exploited by, and for the benefit of, bad actors....
Active Directory Authenticated CIFS(Samba) File Sharing w/Ubuntu 20.04
A while back, we looked at setting up a CentOS 8 CIFS file server with Active Directory Authentication. This blog will go through the same exercise, except using Ubuntu Linux 20.04 LTS. While there are many approaches to making this setup work, we...
Linux Version 8 On Windows Subsystem for Linux
*This Blog is an updated version to the previously published blog Centos Linux Version 8 on Windows Subsystem for Linux
Last year we looked at installing CentOS 8 on Windows 10 WSL. In the past year, there have been many changes to both CentOS and...