This is typically a blog centralized around virtualization but with several posts on Facebook amongst friends discussing this ruling, I thought it'd be worthy of a blog post and a few of my cents on the matter. Now that the Senate and House have both passed the controversial overruling of the FCC allowing ISP's to … Continue reading Protecting your browsing history from S.J.Res 34 – Tips and Tricks
Category: Linux
DISA Approves STIGs for VMware NSX on DoD Networks
Photo credit: @_stump There a lot of abbreviations in this title so I will give a very brief rundown on what it all means and why some of you should care. In the public sector, our systems are hardened (locked down) a bit more drastically than your traditional private company might do things. Simply deploying … Continue reading DISA Approves STIGs for VMware NSX on DoD Networks
Shellshock CVE-2014-6271 Vulnerability and Ansible Playbook
It's been an interesting year in terms of finding massively exploitable Linux issues. Heartbleed was a nightmare that caused several late and long nights for IT teams across the entire globe. It was also one of the first times the Windows IIS crew could sit back and laugh at us for once. And now here … Continue reading Shellshock CVE-2014-6271 Vulnerability and Ansible Playbook
Centralized rsyslog with ESXi 5.x hosts
One of the most important things in any environment is the syslog server. A centralized host to keep all the debug, runtime, and access information to be sent to your Kibana/Logstash or Splunk implementations will make any sysadmins life easier. The walk-through below sets up a central server running rsyslog, accepting logs on 514 from … Continue reading Centralized rsyslog with ESXi 5.x hosts