<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 05 Apr 2026 16:31:01 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Aws”</title>
    <link>https://techsnap.systems/tags/aws</link>
    <pubDate>Thu, 10 Jan 2019 04:00:00 -0800</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>394: All About Azure</title>
  <link>https://techsnap.systems/394</link>
  <guid isPermaLink="false">2e588701-e7a1-4462-99fa-e7ea2275b375</guid>
  <pubDate>Thu, 10 Jan 2019 04:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2e588701-e7a1-4462-99fa-e7ea2275b375.mp3" length="22259879" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.</itunes:subtitle>
  <itunes:duration>26:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths. Special Guest: Chad M. Crowell.
</description>
  <itunes:keywords>Azure, Microsoft, AWS, Cloud, command line, virtualization, Hybrid Cloud, Active Directory, VPC, VPN, Powershell, Powershell core, Azure Sphere, Azure Stack, File Sync, MSSQL, Windows, Linux, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.</p><p>Special Guest: Chad M. Crowell.</p><p>Links:</p><ul><li><a title="Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years" rel="nofollow" href="https://news.microsoft.com/features/under-the-sea-microsoft-tests-a-datacenter-thats-quick-to-deploy-could-provide-internet-connectivity-for-years/">Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years</a></li><li><a title="An Azure Infrastructure Year in Review" rel="nofollow" href="https://www.petri.com/an-azure-infrastructure-year-in-review-2018">An Azure Infrastructure Year in Review</a></li><li><a title="Azure File Sync now generally available" rel="nofollow" href="https://azure.microsoft.com/en-us/blog/score-one-for-the-it-pro-azure-file-sync-is-now-generally-available/">Azure File Sync now generally available</a></li><li><a title="Microsoft&#39;s Newest OS is Based on Linux" rel="nofollow" href="https://www.omgubuntu.co.uk/2018/04/microsoft-linux-custom-kernel-azure-sphere">Microsoft's Newest OS is Based on Linux</a></li><li><a title="Azure Sphere" rel="nofollow" href="https://azure.microsoft.com/en-us/services/azure-sphere/">Azure Sphere</a></li><li><a title="What is Azure Stack?" rel="nofollow" href="https://azure.microsoft.com/en-us/overview/azure-stack/">What is Azure Stack?</a></li><li><a title="Azure Outage Proves the Hard Way Availability Zones are a Good Idea" rel="nofollow" href="https://www.datacenterknowledge.com/microsoft/azure-outage-proves-hard-way-availability-zones-are-good-idea">Azure Outage Proves the Hard Way Availability Zones are a Good Idea</a></li><li><a title=" Microsoft Azure Infrastructure and Deployment on Linux Academy" rel="nofollow" href="https://linuxacademy.com/azure/training/course/name/microsoft-azure-infrastructure-and-deployment-exam-az-100"> Microsoft Azure Infrastructure and Deployment on Linux Academy</a> &mdash; In this course, we will cover an introduction to the Azure portal, followed by how to build infrastructure and deploy that infrastructure in real world scenarios.</li><li><a title="Chad Crowell on Twitter" rel="nofollow" href="https://twitter.com/chadmcrowell?lang=en">Chad Crowell on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.</p><p>Special Guest: Chad M. Crowell.</p><p>Links:</p><ul><li><a title="Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years" rel="nofollow" href="https://news.microsoft.com/features/under-the-sea-microsoft-tests-a-datacenter-thats-quick-to-deploy-could-provide-internet-connectivity-for-years/">Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years</a></li><li><a title="An Azure Infrastructure Year in Review" rel="nofollow" href="https://www.petri.com/an-azure-infrastructure-year-in-review-2018">An Azure Infrastructure Year in Review</a></li><li><a title="Azure File Sync now generally available" rel="nofollow" href="https://azure.microsoft.com/en-us/blog/score-one-for-the-it-pro-azure-file-sync-is-now-generally-available/">Azure File Sync now generally available</a></li><li><a title="Microsoft&#39;s Newest OS is Based on Linux" rel="nofollow" href="https://www.omgubuntu.co.uk/2018/04/microsoft-linux-custom-kernel-azure-sphere">Microsoft's Newest OS is Based on Linux</a></li><li><a title="Azure Sphere" rel="nofollow" href="https://azure.microsoft.com/en-us/services/azure-sphere/">Azure Sphere</a></li><li><a title="What is Azure Stack?" rel="nofollow" href="https://azure.microsoft.com/en-us/overview/azure-stack/">What is Azure Stack?</a></li><li><a title="Azure Outage Proves the Hard Way Availability Zones are a Good Idea" rel="nofollow" href="https://www.datacenterknowledge.com/microsoft/azure-outage-proves-hard-way-availability-zones-are-good-idea">Azure Outage Proves the Hard Way Availability Zones are a Good Idea</a></li><li><a title=" Microsoft Azure Infrastructure and Deployment on Linux Academy" rel="nofollow" href="https://linuxacademy.com/azure/training/course/name/microsoft-azure-infrastructure-and-deployment-exam-az-100"> Microsoft Azure Infrastructure and Deployment on Linux Academy</a> &mdash; In this course, we will cover an introduction to the Azure portal, followed by how to build infrastructure and deploy that infrastructure in real world scenarios.</li><li><a title="Chad Crowell on Twitter" rel="nofollow" href="https://twitter.com/chadmcrowell?lang=en">Chad Crowell on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>393: Back to our /roots</title>
  <link>https://techsnap.systems/393</link>
  <guid isPermaLink="false">1126dc11-7156-4c4d-84f1-a9aa9bf4ebcf</guid>
  <pubDate>Thu, 03 Jan 2019 04:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/1126dc11-7156-4c4d-84f1-a9aa9bf4ebcf.mp3" length="19076619" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</itunes:subtitle>
  <itunes:duration>22:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend. 
</description>
  <itunes:keywords>Security Breach, Flash, AWS, Cloud, Bitcoin, Dropbox, Sony, PSN Breach, Wordpress, SSL, TLS, Allan Jude, FreeBSD, Jim Salter, Information Density, Automation, Bitcoin, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</p><p>Links:</p><ul><li><a title="Jim Salter" rel="nofollow" href="https://arstechnica.com/author/jimsalter/">Jim Salter</a> &mdash; Jim Salter (@jrssnet) is an author, public speaker, small business owner, mercenary sysadmin, and father of three—not necessarily in that order. He got his first real taste of open source by running Apache on his very own dedicated FreeBSD 3.1 server back in 1999, and he's been a fierce advocate of FOSS ever since.</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet?lang=en">Jim Salter on Twitter</a></li><li><a title="Dropbox Flaws | TechSNAP | 1" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE&amp;t=972s">Dropbox Flaws | TechSNAP | 1</a></li><li><a title="PSN Breech Details | TechSNAP 3" rel="nofollow" href="https://www.youtube.com/watch?v=d5FCF9lpVYE">PSN Breech Details | TechSNAP 3</a></li><li><a title="2089 Days Uptime | TechSNAP 300" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">2089 Days Uptime | TechSNAP 300</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</p><p>Links:</p><ul><li><a title="Jim Salter" rel="nofollow" href="https://arstechnica.com/author/jimsalter/">Jim Salter</a> &mdash; Jim Salter (@jrssnet) is an author, public speaker, small business owner, mercenary sysadmin, and father of three—not necessarily in that order. He got his first real taste of open source by running Apache on his very own dedicated FreeBSD 3.1 server back in 1999, and he's been a fierce advocate of FOSS ever since.</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet?lang=en">Jim Salter on Twitter</a></li><li><a title="Dropbox Flaws | TechSNAP | 1" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE&amp;t=972s">Dropbox Flaws | TechSNAP | 1</a></li><li><a title="PSN Breech Details | TechSNAP 3" rel="nofollow" href="https://www.youtube.com/watch?v=d5FCF9lpVYE">PSN Breech Details | TechSNAP 3</a></li><li><a title="2089 Days Uptime | TechSNAP 300" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">2089 Days Uptime | TechSNAP 300</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 391: Firecracker Fundamentals</title>
  <link>https://techsnap.systems/391</link>
  <guid isPermaLink="false">85bdbb45-28a2-4d50-bed1-ade6768e3fa3</guid>
  <pubDate>Thu, 29 Nov 2018 14:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/85bdbb45-28a2-4d50-bed1-ade6768e3fa3.mp3" length="18175107" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different than the options on the market now.</itunes:subtitle>
  <itunes:duration>21:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.
Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.
</description>
  <itunes:keywords>Firecracker, AWS, Amazon, Serverless, Lambda, Fargate, QEMU, KVM, Virtualization, Virtual Machines, VENOM, Rust,  BGP, OpenBSD, RPKI, MITM, dive, Docker, evilginx2, proxy, Sennheiser, TLS, SSL, OpenBGPD, RIPE, LSI, RAID, Allan Jude, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 359: Netflix’s Dark Capacity</title>
  <link>https://techsnap.systems/359</link>
  <guid isPermaLink="false">c63e4421-989c-4e30-813c-cb967a5ab29b</guid>
  <pubDate>Thu, 15 Mar 2018 20:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c63e4421-989c-4e30-813c-cb967a5ab29b.mp3" length="23670639" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. 
</itunes:subtitle>
  <itunes:duration>31:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. 
Plus we discuss Let's Encrypt’s Wildcard support and explain what ACME v2 is.
Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks. 
</description>
  <content:encoded>
    <![CDATA[<p>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. </p>

<p>Plus we discuss Let&#39;s Encrypt’s Wildcard support and explain what ACME v2 is.</p>

<p>Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Hardcoded Password Found in Cisco Software" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/hardcoded-password-found-in-cisco-software/">Hardcoded Password Found in Cisco Software</a> &mdash; Cisco says that an attacker could exploit this vulnerability (CVE-2018-0141) by connecting to the affected system via Secure Shell (SSH) using the hardcoded password.</li><li><a title="Potent malware that hid for six years spread through routers " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/potent-malware-that-hid-for-six-years-spread-through-routers/">Potent malware that hid for six years spread through routers </a> &mdash; "The malware is highly advanced, solving all sorts of problems from a technical perspective and often in a very elegant way, combining older and newer components in a thoroughly thought-through, long-term operation, something to expect from a top-notch well-resourced actor."</li><li><a title="CVE 2018-1057: Authenticated Samba users can change other users&#39; password " rel="nofollow" href="https://www.samba.org/samba/security/CVE-2018-1057.html">CVE 2018-1057: Authenticated Samba users can change other users' password </a> &mdash;  On a Samba 4 AD DC the LDAP server in all versions of Samba from
4.0.0 onwards incorrectly validates permissions to modify passwords
over LDAP allowing authenticated users to change any other users'
passwords, including administrative users and privileged service
accounts (eg Domain Controllers).</li><li><a title="CVE-2018-1057 - SambaWiki Workarounds " rel="nofollow" href="https://wiki.samba.org/index.php/CVE-2018-1057#Workarounds">CVE-2018-1057 - SambaWiki Workarounds </a> &mdash; Revoke the change passwords right for 'the world' from all user objects (including computers) in the directory, leaving only the right to change a user's own password.</li><li><a title="ACME v2 and Wildcard Certificate Support is Live" rel="nofollow" href="https://community.letsencrypt.org/t/acme-v2-and-wildcard-certificate-support-is-live/55579">ACME v2 and Wildcard Certificate Support is Live</a> &mdash; We’re pleased to announce that ACMEv2 and wildcard certificate support is live! </li><li><a title="It just got much easier to wage record-breaking DDoSes " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/it-just-got-much-easier-to-wage-record-breaking-ddoses/">It just got much easier to wage record-breaking DDoSes </a> &mdash; Within days of the new technique going public, security firms reported it being used in a record-setting 1.3 terabit-per-second DDoS against Github and then, two days later, a record-topping 1.7 Tbps attack against an unnamed US-based service provider.</li><li><a title="The real cause of large DDoS " rel="nofollow" href="https://blog.cloudflare.com/the-root-cause-of-large-ddos-ip-spoofing/">The real cause of large DDoS </a> &mdash; All the gigantic headline-grabbing attacks are what we call "L3" (Layer 3 OSI[1]). This kind of attack has a common trait - the malicious software sends as many packets as possible onto the network. </li><li><a title="Project Nimble – Netflix TechBlog" rel="nofollow" href="https://medium.com/netflix-techblog/project-nimble-region-evacuation-reimagined-d0d0568254d4">Project Nimble – Netflix TechBlog</a> &mdash; We set ourselves an aggressive goal of being able to fail over traffic in less than 10 minutes. </li><li><a title="Follow Up: Alex has a tip for Alex" rel="nofollow" href="https://pastebin.com/g97N8teu">Follow Up: Alex has a tip for Alex</a></li><li><a title="Question: Oliver asks about a fail2ban replacement " rel="nofollow" href="https://pastebin.com/wrGGUyBp">Question: Oliver asks about a fail2ban replacement </a></li><li><a title="S3Scanner" rel="nofollow" href="https://github.com/sa7mon/S3Scanner">S3Scanner</a> &mdash; Scan for open S3 buckets and dump </li><li><a title="Chromium is also a Snap" rel="nofollow" href="https://snapcraft.io/chromium">Chromium is also a Snap</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. </p>

<p>Plus we discuss Let&#39;s Encrypt’s Wildcard support and explain what ACME v2 is.</p>

<p>Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Hardcoded Password Found in Cisco Software" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/hardcoded-password-found-in-cisco-software/">Hardcoded Password Found in Cisco Software</a> &mdash; Cisco says that an attacker could exploit this vulnerability (CVE-2018-0141) by connecting to the affected system via Secure Shell (SSH) using the hardcoded password.</li><li><a title="Potent malware that hid for six years spread through routers " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/potent-malware-that-hid-for-six-years-spread-through-routers/">Potent malware that hid for six years spread through routers </a> &mdash; "The malware is highly advanced, solving all sorts of problems from a technical perspective and often in a very elegant way, combining older and newer components in a thoroughly thought-through, long-term operation, something to expect from a top-notch well-resourced actor."</li><li><a title="CVE 2018-1057: Authenticated Samba users can change other users&#39; password " rel="nofollow" href="https://www.samba.org/samba/security/CVE-2018-1057.html">CVE 2018-1057: Authenticated Samba users can change other users' password </a> &mdash;  On a Samba 4 AD DC the LDAP server in all versions of Samba from
4.0.0 onwards incorrectly validates permissions to modify passwords
over LDAP allowing authenticated users to change any other users'
passwords, including administrative users and privileged service
accounts (eg Domain Controllers).</li><li><a title="CVE-2018-1057 - SambaWiki Workarounds " rel="nofollow" href="https://wiki.samba.org/index.php/CVE-2018-1057#Workarounds">CVE-2018-1057 - SambaWiki Workarounds </a> &mdash; Revoke the change passwords right for 'the world' from all user objects (including computers) in the directory, leaving only the right to change a user's own password.</li><li><a title="ACME v2 and Wildcard Certificate Support is Live" rel="nofollow" href="https://community.letsencrypt.org/t/acme-v2-and-wildcard-certificate-support-is-live/55579">ACME v2 and Wildcard Certificate Support is Live</a> &mdash; We’re pleased to announce that ACMEv2 and wildcard certificate support is live! </li><li><a title="It just got much easier to wage record-breaking DDoSes " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/it-just-got-much-easier-to-wage-record-breaking-ddoses/">It just got much easier to wage record-breaking DDoSes </a> &mdash; Within days of the new technique going public, security firms reported it being used in a record-setting 1.3 terabit-per-second DDoS against Github and then, two days later, a record-topping 1.7 Tbps attack against an unnamed US-based service provider.</li><li><a title="The real cause of large DDoS " rel="nofollow" href="https://blog.cloudflare.com/the-root-cause-of-large-ddos-ip-spoofing/">The real cause of large DDoS </a> &mdash; All the gigantic headline-grabbing attacks are what we call "L3" (Layer 3 OSI[1]). This kind of attack has a common trait - the malicious software sends as many packets as possible onto the network. </li><li><a title="Project Nimble – Netflix TechBlog" rel="nofollow" href="https://medium.com/netflix-techblog/project-nimble-region-evacuation-reimagined-d0d0568254d4">Project Nimble – Netflix TechBlog</a> &mdash; We set ourselves an aggressive goal of being able to fail over traffic in less than 10 minutes. </li><li><a title="Follow Up: Alex has a tip for Alex" rel="nofollow" href="https://pastebin.com/g97N8teu">Follow Up: Alex has a tip for Alex</a></li><li><a title="Question: Oliver asks about a fail2ban replacement " rel="nofollow" href="https://pastebin.com/wrGGUyBp">Question: Oliver asks about a fail2ban replacement </a></li><li><a title="S3Scanner" rel="nofollow" href="https://github.com/sa7mon/S3Scanner">S3Scanner</a> &mdash; Scan for open S3 buckets and dump </li><li><a title="Chromium is also a Snap" rel="nofollow" href="https://snapcraft.io/chromium">Chromium is also a Snap</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 358: A Future Without Servers</title>
  <link>https://techsnap.systems/358</link>
  <guid isPermaLink="false">dd10266c-5d78-43c7-bf71-1d3abb89a7a5</guid>
  <pubDate>Thu, 01 Mar 2018 08:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/dd10266c-5d78-43c7-bf71-1d3abb89a7a5.mp3" length="26781664" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. </itunes:subtitle>
  <itunes:duration>36:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. 
Plus new research with ideas to dramatically improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s, and much more! 
</description>
  <content:encoded>
    <![CDATA[<p>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. </p>

<p>Plus new research with ideas to dramatically improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s, and much more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Revamp of &#39;Pwned Passwords&#39; Boosts Privacy and Size of Database" rel="nofollow" href="https://threatpost.com/revamp-of-pwned-passwords-boosts-privacy-and-size-of-database/130082/">Revamp of 'Pwned Passwords' Boosts Privacy and Size of Database</a> &mdash; In V2 of Pwned Passwords, launched last week, Hunt updated his password data set from 320 million passwords to 501 million new passwords, pulled from almost 3,000 breaches over the past year.</li><li><a title="Finding Pwned Passwords with 1Password" rel="nofollow" href="https://blog.agilebits.com/2018/02/22/finding-pwned-passwords-with-1password/">Finding Pwned Passwords with 1Password</a> &mdash; Troy Hunt and his friends from Cloudflare found a brilliant way to check if my password is leaked without ever needing to send my password to their service. Their server never receives enough information to reconstruct my password.</li><li><a title="Troy Hunt: I&#39;ve Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned" rel="nofollow" href="https://www.troyhunt.com/ive-just-added-2844-new-data-breaches-with-80m-records-to-have-i-been-pwned/">Troy Hunt: I've Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned</a></li><li><a title="Apple’s China data migration includes iCloud keys, making data requests easier for authorities" rel="nofollow" href="https://9to5mac.com/2018/02/24/icloud-data-keys-migration/">Apple’s China data migration includes iCloud keys, making data requests easier for authorities</a> &mdash; Now, according to Apple, for the first time the company will store the keys for Chinese iCloud accounts in China itself. That means Chinese authorities will no longer have to use the U.S. courts to seek information on iCloud users and can instead use their own legal system to ask Apple to hand over iCloud data for Chinese users, legal experts said.</li><li><a title="Microsoft’s Big Email Privacy Case Heads to the Supreme Court Tomorrow" rel="nofollow" href="https://gizmodo.com/microsoft-s-big-email-privacy-case-heads-to-the-supreme-1823328595">Microsoft’s Big Email Privacy Case Heads to the Supreme Court Tomorrow</a> &mdash; The 2013 warrant involved a drug case, and the Justice Department asked Microsoft to turn over emails that were stored in its Ireland data center. Microsoft objected, arguing that the DoJ could not use a domestic warrant to conduct an international search and that it should instead acquire the data through a treaty process with the Irish government.</li><li><a title="Researchers Propose Improved Private Web Browsing System" rel="nofollow" href="https://www.securityweek.com/researchers-propose-improved-private-web-browsing-system">Researchers Propose Improved Private Web Browsing System</a> &mdash; The newly proposed system keeps all the data that the browse loads into memory encrypted until it is displayed on the screen, the researchers say. Users no longer type a URL into the browser, but access the Veil website and enter the URL there. With the help of a blinding server, the Veil format of the requested page is transmitted. </li><li><a title="Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2017" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/nearly-8-000-security-flaws-did-not-receive-a-cve-id-in-2017/">Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2017</a> &mdash; A record-breaking number of 20,832 vulnerabilities have been discovered in 2017 but only 12,932 of these received an official CVE identifier last year, a Risk Based Security (RBS) report reveals.</li><li><a title="What is Serverless Architecture? What are its criticisms and drawbacks?" rel="nofollow" href="https://medium.com/@MarutiTech/what-is-serverless-architecture-what-are-its-criticisms-and-drawbacks-928659f9899a">What is Serverless Architecture? What are its criticisms and drawbacks?</a> &mdash; Serverless architectures refer to applications that significantly depend on third-party services (knows as Backend as a Service or “BaaS”) or on custom code that’s run in ephemeral containers (Function as a Service or “FaaS”), the best known vendor host of which currently is AWS Lambda.</li><li><a title="Serverless Security: What&#39;s Left to Protect?" rel="nofollow" href="https://www.infoq.com/articles/serverless-security">Serverless Security: What's Left to Protect?</a></li><li><a title="OpenFaaS - Serverless Functions Made Simple" rel="nofollow" href="https://www.openfaas.com/">OpenFaaS - Serverless Functions Made Simple</a> &mdash; Serverless Functions Made Simple for Docker and Kubernetes</li><li><a title="open-lambda: An open source serverless computing platform" rel="nofollow" href="https://github.com/open-lambda/open-lambda">open-lambda: An open source serverless computing platform</a> &mdash; An open source serverless computing platform</li><li><a title="Iron.io - DevOps Solutions from Startups to Enterprise" rel="nofollow" href="https://www.iron.io/">Iron.io - DevOps Solutions from Startups to Enterprise</a></li><li><a title="Apache OpenWhisk is a serverless, open source cloud platform" rel="nofollow" href="https://openwhisk.apache.org/">Apache OpenWhisk is a serverless, open source cloud platform</a></li><li><a title="Feedback: David&#39;s Drive Tips" rel="nofollow" href="https://pastebin.com/iSZgfPuc">Feedback: David's Drive Tips</a></li><li><a title="Question: Alex has BIG cloud storage requirements...." rel="nofollow" href="https://pastebin.com/mY78CNxK">Question: Alex has BIG cloud storage requirements....</a></li><li><a title="Crostini - Linux App Containers on ChromeOS " rel="nofollow" href="https://liliputing.com/2018/02/chromebooks-may-get-native-support-linux-apps-via-crostini.html">Crostini - Linux App Containers on ChromeOS </a> &mdash; In other words, the Crostini/Terminal feature could be to Chrome OS what the Windows Subsystem for Linux is for Windows 10: a way that developers, power users, and Linux enthusiasts can run native Linux software on a device that’s not running a traditional Linux distribution.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. </p>

<p>Plus new research with ideas to dramatically improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s, and much more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Revamp of &#39;Pwned Passwords&#39; Boosts Privacy and Size of Database" rel="nofollow" href="https://threatpost.com/revamp-of-pwned-passwords-boosts-privacy-and-size-of-database/130082/">Revamp of 'Pwned Passwords' Boosts Privacy and Size of Database</a> &mdash; In V2 of Pwned Passwords, launched last week, Hunt updated his password data set from 320 million passwords to 501 million new passwords, pulled from almost 3,000 breaches over the past year.</li><li><a title="Finding Pwned Passwords with 1Password" rel="nofollow" href="https://blog.agilebits.com/2018/02/22/finding-pwned-passwords-with-1password/">Finding Pwned Passwords with 1Password</a> &mdash; Troy Hunt and his friends from Cloudflare found a brilliant way to check if my password is leaked without ever needing to send my password to their service. Their server never receives enough information to reconstruct my password.</li><li><a title="Troy Hunt: I&#39;ve Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned" rel="nofollow" href="https://www.troyhunt.com/ive-just-added-2844-new-data-breaches-with-80m-records-to-have-i-been-pwned/">Troy Hunt: I've Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned</a></li><li><a title="Apple’s China data migration includes iCloud keys, making data requests easier for authorities" rel="nofollow" href="https://9to5mac.com/2018/02/24/icloud-data-keys-migration/">Apple’s China data migration includes iCloud keys, making data requests easier for authorities</a> &mdash; Now, according to Apple, for the first time the company will store the keys for Chinese iCloud accounts in China itself. That means Chinese authorities will no longer have to use the U.S. courts to seek information on iCloud users and can instead use their own legal system to ask Apple to hand over iCloud data for Chinese users, legal experts said.</li><li><a title="Microsoft’s Big Email Privacy Case Heads to the Supreme Court Tomorrow" rel="nofollow" href="https://gizmodo.com/microsoft-s-big-email-privacy-case-heads-to-the-supreme-1823328595">Microsoft’s Big Email Privacy Case Heads to the Supreme Court Tomorrow</a> &mdash; The 2013 warrant involved a drug case, and the Justice Department asked Microsoft to turn over emails that were stored in its Ireland data center. Microsoft objected, arguing that the DoJ could not use a domestic warrant to conduct an international search and that it should instead acquire the data through a treaty process with the Irish government.</li><li><a title="Researchers Propose Improved Private Web Browsing System" rel="nofollow" href="https://www.securityweek.com/researchers-propose-improved-private-web-browsing-system">Researchers Propose Improved Private Web Browsing System</a> &mdash; The newly proposed system keeps all the data that the browse loads into memory encrypted until it is displayed on the screen, the researchers say. Users no longer type a URL into the browser, but access the Veil website and enter the URL there. With the help of a blinding server, the Veil format of the requested page is transmitted. </li><li><a title="Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2017" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/nearly-8-000-security-flaws-did-not-receive-a-cve-id-in-2017/">Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2017</a> &mdash; A record-breaking number of 20,832 vulnerabilities have been discovered in 2017 but only 12,932 of these received an official CVE identifier last year, a Risk Based Security (RBS) report reveals.</li><li><a title="What is Serverless Architecture? What are its criticisms and drawbacks?" rel="nofollow" href="https://medium.com/@MarutiTech/what-is-serverless-architecture-what-are-its-criticisms-and-drawbacks-928659f9899a">What is Serverless Architecture? What are its criticisms and drawbacks?</a> &mdash; Serverless architectures refer to applications that significantly depend on third-party services (knows as Backend as a Service or “BaaS”) or on custom code that’s run in ephemeral containers (Function as a Service or “FaaS”), the best known vendor host of which currently is AWS Lambda.</li><li><a title="Serverless Security: What&#39;s Left to Protect?" rel="nofollow" href="https://www.infoq.com/articles/serverless-security">Serverless Security: What's Left to Protect?</a></li><li><a title="OpenFaaS - Serverless Functions Made Simple" rel="nofollow" href="https://www.openfaas.com/">OpenFaaS - Serverless Functions Made Simple</a> &mdash; Serverless Functions Made Simple for Docker and Kubernetes</li><li><a title="open-lambda: An open source serverless computing platform" rel="nofollow" href="https://github.com/open-lambda/open-lambda">open-lambda: An open source serverless computing platform</a> &mdash; An open source serverless computing platform</li><li><a title="Iron.io - DevOps Solutions from Startups to Enterprise" rel="nofollow" href="https://www.iron.io/">Iron.io - DevOps Solutions from Startups to Enterprise</a></li><li><a title="Apache OpenWhisk is a serverless, open source cloud platform" rel="nofollow" href="https://openwhisk.apache.org/">Apache OpenWhisk is a serverless, open source cloud platform</a></li><li><a title="Feedback: David&#39;s Drive Tips" rel="nofollow" href="https://pastebin.com/iSZgfPuc">Feedback: David's Drive Tips</a></li><li><a title="Question: Alex has BIG cloud storage requirements...." rel="nofollow" href="https://pastebin.com/mY78CNxK">Question: Alex has BIG cloud storage requirements....</a></li><li><a title="Crostini - Linux App Containers on ChromeOS " rel="nofollow" href="https://liliputing.com/2018/02/chromebooks-may-get-native-support-linux-apps-via-crostini.html">Crostini - Linux App Containers on ChromeOS </a> &mdash; In other words, the Crostini/Terminal feature could be to Chrome OS what the Windows Subsystem for Linux is for Windows 10: a way that developers, power users, and Linux enthusiasts can run native Linux software on a device that’s not running a traditional Linux distribution.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
