Cybersecurity | Cloud | DevelopmentSSH Single-Sign On with Kerberos July 9, 2022 video AuthenticationkerberosLinuxSingle sign onSolutionSSH
Cybersecurity | Cloud | DevelopmentAmazon AWS: How to change AWS EC2 Key pair by doing SSH | Keypair Rotation | 2021 May 20, 2022 video Amazon Web ServicesAWSby volume changecentoschange keypair in a secondchange pem keypairconvert to ppk filecreating pem keypairEC2elastic computegenerate public keyinstance key pair is stored ininstance login using new keypairkeypairkeypair changekeypair rotationLinuxmumbai regionpassword rotaionpemppkpubkeyredhatrotate keypairrunning instance key pair changesmall videoSSHssh instancetutorial on changing instance keypairubuntu
Cybersecurity | Cloud | DevelopmentInterfacing Linux: Raspberry Pi Zero SSH & WiFi (no keyboard) December 23, 2021 video debianetcherheadlessLinuxraspberry pi zeroraspi osSSHwifiwpa
Cybersecurity | Cloud | DevelopmentOn Ubuntu 16.04, Freeipa ssh logins working, GUI logins fails with "incorrect password" October 1, 2021 video answerFreeIPALinuxmate desktopproblemSolutionsSSHubuntuUNIX
Cybersecurity | Cloud | DevelopmentUsing Pod Security Policies to harden your Kubernetes cluster December 16, 2020 video 2019alertingArchitectureautomatebountybugcertificatecloudclusterdefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeykuberneteslogmaliciousmanagementmanagermonitoringmultinetworkOLAPOLTPOnionOpenopenscapOSINTpodpolarDBPolicyprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemtenantTortrafficusabilityUserVitessWireshark
Cybersecurity | Cloud | DevelopmentScale MySQL beyond limits with ProxySQL November 22, 2020 video 2019alertingArchitectureautomatebountybugcertificateclouddefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeylogmanagementmanagermonitoringOLAPOLTPOnionOpenopenscapOSINTpolarDBprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemTorVitessWireshark