<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 18 Apr 2026 19:37:14 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Kubernetes”</title>
    <link>https://techsnap.systems/tags/kubernetes</link>
    <pubDate>Fri, 10 May 2019 21:00:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>403: Keeping Systems Simple</title>
  <link>https://techsnap.systems/403</link>
  <guid isPermaLink="false">e26c9e2a-3e0f-40b9-9875-d72821ee1792</guid>
  <pubDate>Fri, 10 May 2019 21:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/e26c9e2a-3e0f-40b9-9875-d72821ee1792.mp3" length="33509482" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</itunes:subtitle>
  <itunes:duration>46:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems. 
</description>
  <itunes:keywords>wireguard, vpn, openvpn, tinc, ipsec, lfnw, tunnel, ssh, mesh network, layer 3, tcp, udp, dhcp, ethernet, vlan, switch, router, firewall, kubernetes, linux, wintun, high availability, reliability, availability, disaster recovery, rto, rpo, security, quantum computers, cryptography, simplicity, SysAdmin podcast, subspace, zinc, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</p><p>Links:</p><ul><li><a title="TechSNAP Episode 390: What’s Up with WireGuard" rel="nofollow" href="https://techsnap.systems/390">TechSNAP Episode 390: What’s Up with WireGuard</a></li><li><a title="WireGuard Sent Out Again For Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-V9-Maybe-Linux-5.2">WireGuard Sent Out Again For Review</a> &mdash; WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel. 
</li><li><a title="CloudFlare announces Warp VPN" rel="nofollow" href="https://securitybaron.com/news/cloudflare-warp-vpn/">CloudFlare announces Warp VPN</a> &mdash; Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.</li><li><a title="CloudFlare Launches &quot;BoringTun&quot; As Rust-Written WireGuard User-Space Implementation - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=CloudFlare-BoringTun-WireGuard">CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix</a> &mdash; CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution. </li><li><a title="cloudflare/boringtun" rel="nofollow" href="https://github.com/cloudflare/boringtun">cloudflare/boringtun</a> &mdash; BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.

</li><li><a title="VPN protocol WireGuard now has an official macOS app" rel="nofollow" href="https://techcrunch.com/2019/02/18/vpn-protocol-wireguard-now-has-an-official-macos-app/">VPN protocol WireGuard now has an official macOS app</a> &mdash; You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.</li><li><a title="WireGuard Windows Pre-Alpha" rel="nofollow" href="https://lists.zx2c4.com/pipermail/wireguard/2019-May/004126.html">WireGuard Windows Pre-Alpha</a> &mdash; I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".</li><li><a title="Wintun – Layer 3 TUN Driver for Windows" rel="nofollow" href="https://www.wintun.net/">Wintun – Layer 3 TUN Driver for Windows</a> &mdash; Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun. </li><li><a title="WireGuard for Kubernetes: Introducing Gravitational Wormhole" rel="nofollow" href="https://gravitational.com/blog/announcing_wormhole/">WireGuard for Kubernetes: Introducing Gravitational Wormhole</a> &mdash; Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.</li><li><a title="gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes" rel="nofollow" href="https://github.com/gravitational/wormhole#getting-started">gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes</a></li><li><a title="NetworkManager 1.16" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetworkManager-1.16-Released">NetworkManager 1.16</a> &mdash; NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels</li><li><a title="Portal Cloud - Subspace" rel="nofollow" href="https://portal.cloud/app/subspace">Portal Cloud - Subspace</a> &mdash; Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.

</li><li><a title="subspacecloud/subspace" rel="nofollow" href="https://github.com/subspacecloud/subspace">subspacecloud/subspace</a> &mdash; A simple WireGuard VPN server GUI</li><li><a title="jimsalterjrs/wg-admin" rel="nofollow" href="https://github.com/jimsalterjrs/wg-admin">jimsalterjrs/wg-admin</a> &mdash; Simple CLI utilities to manage a WireGuard server</li><li><a title="5 big misconceptions about virtual LANs" rel="nofollow" href="https://www.pluralsight.com/blog/it-ops/5-big-misconceptions-about-virtual-lans-">5 big misconceptions about virtual LANs</a> &mdash; In the real world, VLANs are anything but simple.
</li><li><a title="High Availability vs. Fault Tolerance vs. Disaster Recovery" rel="nofollow" href="https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery">High Availability vs. Fault Tolerance vs. Disaster Recovery</a> &mdash; You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</li><li><a title="High Availability: Concepts and Theory" rel="nofollow" href="https://hackernoon.com/high-availability-concepts-and-theory-980c58cbf87b">High Availability: Concepts and Theory</a> &mdash; Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server. </li><li><a title="RPO and RTO: Understanding the Differences" rel="nofollow" href="https://www.enterprisestorageforum.com/storage-management/rpo-and-rto-understanding-the-differences.html">RPO and RTO: Understanding the Differences</a> &mdash; Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.</li><li><a title="JupiterBroadcasting/Talks" rel="nofollow" href="https://github.com/JupiterBroadcasting/Talks">JupiterBroadcasting/Talks</a> &mdash; Public repository of crew talks, slides, and additional resources.</li><li><a title="Command Line Threat Hunting" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/260707829/">Command Line Threat Hunting</a> &mdash; That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.</li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution</a> &mdash; For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</p><p>Links:</p><ul><li><a title="TechSNAP Episode 390: What’s Up with WireGuard" rel="nofollow" href="https://techsnap.systems/390">TechSNAP Episode 390: What’s Up with WireGuard</a></li><li><a title="WireGuard Sent Out Again For Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-V9-Maybe-Linux-5.2">WireGuard Sent Out Again For Review</a> &mdash; WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel. 
</li><li><a title="CloudFlare announces Warp VPN" rel="nofollow" href="https://securitybaron.com/news/cloudflare-warp-vpn/">CloudFlare announces Warp VPN</a> &mdash; Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.</li><li><a title="CloudFlare Launches &quot;BoringTun&quot; As Rust-Written WireGuard User-Space Implementation - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=CloudFlare-BoringTun-WireGuard">CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix</a> &mdash; CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution. </li><li><a title="cloudflare/boringtun" rel="nofollow" href="https://github.com/cloudflare/boringtun">cloudflare/boringtun</a> &mdash; BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.

</li><li><a title="VPN protocol WireGuard now has an official macOS app" rel="nofollow" href="https://techcrunch.com/2019/02/18/vpn-protocol-wireguard-now-has-an-official-macos-app/">VPN protocol WireGuard now has an official macOS app</a> &mdash; You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.</li><li><a title="WireGuard Windows Pre-Alpha" rel="nofollow" href="https://lists.zx2c4.com/pipermail/wireguard/2019-May/004126.html">WireGuard Windows Pre-Alpha</a> &mdash; I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".</li><li><a title="Wintun – Layer 3 TUN Driver for Windows" rel="nofollow" href="https://www.wintun.net/">Wintun – Layer 3 TUN Driver for Windows</a> &mdash; Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun. </li><li><a title="WireGuard for Kubernetes: Introducing Gravitational Wormhole" rel="nofollow" href="https://gravitational.com/blog/announcing_wormhole/">WireGuard for Kubernetes: Introducing Gravitational Wormhole</a> &mdash; Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.</li><li><a title="gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes" rel="nofollow" href="https://github.com/gravitational/wormhole#getting-started">gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes</a></li><li><a title="NetworkManager 1.16" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetworkManager-1.16-Released">NetworkManager 1.16</a> &mdash; NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels</li><li><a title="Portal Cloud - Subspace" rel="nofollow" href="https://portal.cloud/app/subspace">Portal Cloud - Subspace</a> &mdash; Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.

</li><li><a title="subspacecloud/subspace" rel="nofollow" href="https://github.com/subspacecloud/subspace">subspacecloud/subspace</a> &mdash; A simple WireGuard VPN server GUI</li><li><a title="jimsalterjrs/wg-admin" rel="nofollow" href="https://github.com/jimsalterjrs/wg-admin">jimsalterjrs/wg-admin</a> &mdash; Simple CLI utilities to manage a WireGuard server</li><li><a title="5 big misconceptions about virtual LANs" rel="nofollow" href="https://www.pluralsight.com/blog/it-ops/5-big-misconceptions-about-virtual-lans-">5 big misconceptions about virtual LANs</a> &mdash; In the real world, VLANs are anything but simple.
</li><li><a title="High Availability vs. Fault Tolerance vs. Disaster Recovery" rel="nofollow" href="https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery">High Availability vs. Fault Tolerance vs. Disaster Recovery</a> &mdash; You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</li><li><a title="High Availability: Concepts and Theory" rel="nofollow" href="https://hackernoon.com/high-availability-concepts-and-theory-980c58cbf87b">High Availability: Concepts and Theory</a> &mdash; Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server. </li><li><a title="RPO and RTO: Understanding the Differences" rel="nofollow" href="https://www.enterprisestorageforum.com/storage-management/rpo-and-rto-understanding-the-differences.html">RPO and RTO: Understanding the Differences</a> &mdash; Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.</li><li><a title="JupiterBroadcasting/Talks" rel="nofollow" href="https://github.com/JupiterBroadcasting/Talks">JupiterBroadcasting/Talks</a> &mdash; Public repository of crew talks, slides, and additional resources.</li><li><a title="Command Line Threat Hunting" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/260707829/">Command Line Threat Hunting</a> &mdash; That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.</li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution</a> &mdash; For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>392: Keeping up with Kubernetes</title>
  <link>https://techsnap.systems/392</link>
  <guid isPermaLink="false">45523a8f-70a8-4800-a757-964c8f91f645</guid>
  <pubDate>Wed, 12 Dec 2018 19:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/45523a8f-70a8-4800-a757-964c8f91f645.mp3" length="23364271" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. 
</itunes:subtitle>
  <itunes:duration>27:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. 
Plus the biggest stories out of Kubecon, and serverless gets serious. 
</description>
  <itunes:keywords>Kubecon, Kubernetes, Istio, CNCF, etcd, traefik, knative, google, k8s, red hat, ibm, openwhisk, serverless, faas, rook, cloud native, storage, ceph, Helm, Helm hub, Elasticsearch, Chromium OS, Chromium, Event driven, CloudEvent, Containers, Container Vulnerability, GitLab, Crossplane, Control Plane, Multicloud, holiday, christmas, security.christmas, CVE, Security Vulnerability, CVE-2018-1002105, kube-apiserver, websocket, RBAC, HTTP, metrics, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. </p>

<p>Plus the biggest stories out of Kubecon, and serverless gets serious.</p><p>Links:</p><ul><li><a title="Everything that was announced at KubeCon" rel="nofollow" href="https://venturebeat.com/2018/12/11/everything-that-was-announced-at-kubecon-cloudnativecon/">Everything that was announced at KubeCon</a></li><li><a title="CNCF to Host etcd" rel="nofollow" href="https://www.cncf.io/blog/2018/12/11/cncf-to-host-etcd/">CNCF to Host etcd</a> &mdash; The Cloud Native Computing Foundation Technical Oversight Committee voted to accept etcd as an incubation-level hosted project.</li><li><a title="Introduction to Knative" rel="nofollow" href="https://medium.com/@pczarkowski/introduction-to-knative-b93a0b9aeeef">Introduction to Knative</a> &mdash; Knative is a framework from the folks at Google and Pivotal focused on “serverless” style event driven functions.</li><li><a title="IBM Embraces Knative to Drive Serverless Standardization" rel="nofollow" href="https://www.eweek.com/cloud/ibm-embraces-knative-to-drive-serverless-standardization">IBM Embraces Knative to Drive Serverless Standardization</a> &mdash; Knative is not the first open-source functions-as-a-service effort that IBM has backed. Back in 2016, IBM announced the OpenWhisk effort, which is now run as an open-source project at the Apache Software Found.</li><li><a title="How Google Is Improving Kubernetes Container Security" rel="nofollow" href="http://www.eweek.com/security/how-google-is-improving-kubernetes-container-security">How Google Is Improving Kubernetes Container Security</a> &mdash; "We go beyond what's in open source and put additional restrictions in place to secure users"</li><li><a title="Demystifying Kubernetes CVE-2018-1002105" rel="nofollow" href="https://www.twistlock.com/labs-blog/demystifying-kubernetes-cve-2018-1002105-dead-simple-exploit/">Demystifying Kubernetes CVE-2018-1002105</a> &mdash; With a specially crafted request, users that are authorized to establish a connection through the Kubernetes API server to a backend server can then send arbitrary requests over the same connection directly to that backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection.</li><li><a title="The silent CVE in the heart of Kubernetes apiserver" rel="nofollow" href="https://gravitational.com/blog/kubernetes-websocket-upgrade-security-vulnerability/">The silent CVE in the heart of Kubernetes apiserver</a></li><li><a title="Crossplane: An Open Source Multicloud Control Plane" rel="nofollow" href="https://github.com/crossplaneio/crossplane">Crossplane: An Open Source Multicloud Control Plane</a></li><li><a title="security.christmas" rel="nofollow" href="https://security.christmas/">security.christmas</a> &mdash; This year we will prepare you for the Christmas celebration, by giving you small presents of knowledge every day, which will teach you about the world of security.</li><li><a title="Introducing the Helm Hub" rel="nofollow" href="https://www.helm.sh/blog/intro-helm-hub/index.html">Introducing the Helm Hub</a> &mdash; This hub provides a means for you to find charts hosted in many distributed repositories hosted by numerous people and organizations.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. </p>

<p>Plus the biggest stories out of Kubecon, and serverless gets serious.</p><p>Links:</p><ul><li><a title="Everything that was announced at KubeCon" rel="nofollow" href="https://venturebeat.com/2018/12/11/everything-that-was-announced-at-kubecon-cloudnativecon/">Everything that was announced at KubeCon</a></li><li><a title="CNCF to Host etcd" rel="nofollow" href="https://www.cncf.io/blog/2018/12/11/cncf-to-host-etcd/">CNCF to Host etcd</a> &mdash; The Cloud Native Computing Foundation Technical Oversight Committee voted to accept etcd as an incubation-level hosted project.</li><li><a title="Introduction to Knative" rel="nofollow" href="https://medium.com/@pczarkowski/introduction-to-knative-b93a0b9aeeef">Introduction to Knative</a> &mdash; Knative is a framework from the folks at Google and Pivotal focused on “serverless” style event driven functions.</li><li><a title="IBM Embraces Knative to Drive Serverless Standardization" rel="nofollow" href="https://www.eweek.com/cloud/ibm-embraces-knative-to-drive-serverless-standardization">IBM Embraces Knative to Drive Serverless Standardization</a> &mdash; Knative is not the first open-source functions-as-a-service effort that IBM has backed. Back in 2016, IBM announced the OpenWhisk effort, which is now run as an open-source project at the Apache Software Found.</li><li><a title="How Google Is Improving Kubernetes Container Security" rel="nofollow" href="http://www.eweek.com/security/how-google-is-improving-kubernetes-container-security">How Google Is Improving Kubernetes Container Security</a> &mdash; "We go beyond what's in open source and put additional restrictions in place to secure users"</li><li><a title="Demystifying Kubernetes CVE-2018-1002105" rel="nofollow" href="https://www.twistlock.com/labs-blog/demystifying-kubernetes-cve-2018-1002105-dead-simple-exploit/">Demystifying Kubernetes CVE-2018-1002105</a> &mdash; With a specially crafted request, users that are authorized to establish a connection through the Kubernetes API server to a backend server can then send arbitrary requests over the same connection directly to that backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection.</li><li><a title="The silent CVE in the heart of Kubernetes apiserver" rel="nofollow" href="https://gravitational.com/blog/kubernetes-websocket-upgrade-security-vulnerability/">The silent CVE in the heart of Kubernetes apiserver</a></li><li><a title="Crossplane: An Open Source Multicloud Control Plane" rel="nofollow" href="https://github.com/crossplaneio/crossplane">Crossplane: An Open Source Multicloud Control Plane</a></li><li><a title="security.christmas" rel="nofollow" href="https://security.christmas/">security.christmas</a> &mdash; This year we will prepare you for the Christmas celebration, by giving you small presents of knowledge every day, which will teach you about the world of security.</li><li><a title="Introducing the Helm Hub" rel="nofollow" href="https://www.helm.sh/blog/intro-helm-hub/index.html">Introducing the Helm Hub</a> &mdash; This hub provides a means for you to find charts hosted in many distributed repositories hosted by numerous people and organizations.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 387: Private Cloud Building Blocks</title>
  <link>https://techsnap.systems/387</link>
  <guid isPermaLink="false">c6e35c4d-a8a5-4394-8e7f-9acd91aa5aa2</guid>
  <pubDate>Thu, 11 Oct 2018 17:45:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c6e35c4d-a8a5-4394-8e7f-9acd91aa5aa2.mp3" length="28532297" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.</itunes:subtitle>
  <itunes:duration>33:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.
Plus a few warm up stories, a war story, and more.
 Special Guest: Amy Marrich.
</description>
  <itunes:keywords>IPFS, Phishing, RFC, Uber, Writing Things Down, Kata Containers, Containers, Kubernetes, CRI, Private Cloud, OpenStack, Rocky, Zun, Zuul, Magnum, Ansible, Amy Marrich, SysAdmin, Rachel Kroll, OpenStack Training Artichect, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.</p>

<p>Plus a few warm up stories, a war story, and more.</p><p>Special Guest: Amy Marrich.</p><p>Links:</p><ul><li><a title="James Stanley - Someone used my IPFS gateway for phishing" rel="nofollow" href="https://incoherency.co.uk/blog/stories/hardbin-phishing.html">James Stanley - Someone used my IPFS gateway for phishing</a></li><li><a title="Scaling Engineering Teams via Writing Things Down and Sharing" rel="nofollow" href="https://blog.pragmaticengineer.com/scaling-engineering-teams-via-writing-things-down-rfcs/">Scaling Engineering Teams via Writing Things Down and Sharing</a> &mdash; I have recently been talking at small and mid-size companies, sharing engineering best practices I see us use at Uber, which I would recommend any tech company adopt as they are growing. The one topic that gets both the most raised eyebrows, as well the most "aha!" moments is the one on how the planning process for engineering has worked since the early years of Uber.</li><li><a title="Say hello to Kata Containers" rel="nofollow" href="http://superuser.openstack.org/articles/kata-containers-1-0/">Say hello to Kata Containers</a> &mdash; Kata Containers bridges the gap between traditional VM security and the lightweight benefits of traditional Linux containers.</li><li><a title="Disappearing videos and disappointed grandmothers" rel="nofollow" href="https://rachelbythebay.com/w/2018/10/05/recipes/">Disappearing videos and disappointed grandmothers</a> &mdash; Here's another story about broken things with some of the details changed just a little. If it sounds familiar, it's probably because your company also did it at some point.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.</p>

<p>Plus a few warm up stories, a war story, and more.</p><p>Special Guest: Amy Marrich.</p><p>Links:</p><ul><li><a title="James Stanley - Someone used my IPFS gateway for phishing" rel="nofollow" href="https://incoherency.co.uk/blog/stories/hardbin-phishing.html">James Stanley - Someone used my IPFS gateway for phishing</a></li><li><a title="Scaling Engineering Teams via Writing Things Down and Sharing" rel="nofollow" href="https://blog.pragmaticengineer.com/scaling-engineering-teams-via-writing-things-down-rfcs/">Scaling Engineering Teams via Writing Things Down and Sharing</a> &mdash; I have recently been talking at small and mid-size companies, sharing engineering best practices I see us use at Uber, which I would recommend any tech company adopt as they are growing. The one topic that gets both the most raised eyebrows, as well the most "aha!" moments is the one on how the planning process for engineering has worked since the early years of Uber.</li><li><a title="Say hello to Kata Containers" rel="nofollow" href="http://superuser.openstack.org/articles/kata-containers-1-0/">Say hello to Kata Containers</a> &mdash; Kata Containers bridges the gap between traditional VM security and the lightweight benefits of traditional Linux containers.</li><li><a title="Disappearing videos and disappointed grandmothers" rel="nofollow" href="https://rachelbythebay.com/w/2018/10/05/recipes/">Disappearing videos and disappointed grandmothers</a> &mdash; Here's another story about broken things with some of the details changed just a little. If it sounds familiar, it's probably because your company also did it at some point.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 386: What Makes Google Cloud Different</title>
  <link>https://techsnap.systems/386</link>
  <guid isPermaLink="false">18d614a8-cc5e-47e9-9cad-3f411f1ae0cd</guid>
  <pubDate>Thu, 04 Oct 2018 16:45:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/18d614a8-cc5e-47e9-9cad-3f411f1ae0cd.mp3" length="29644989" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different. </itunes:subtitle>
  <itunes:duration>34:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different. 
Plus how Google hopes Roughtime will solve one of the web’s biggest problems, some great emails, and more! Special Guest: Matt Ulasien.
</description>
  <itunes:keywords>Roughtime, NTP, Timekeeping, Google Cloud, Container Security, Cloud Build, IoT, Kubernetes, KubeSpy, KubeDirector, Bare Metal Kubernetes, Matt Ulasien, SysAdmin Podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different. </p>

<p>Plus how Google hopes Roughtime will solve one of the web’s biggest problems, some great emails, and more!</p><p>Special Guest: Matt Ulasien.</p><p>Links:</p><ul><li><a title="Cloudflare Embraces Google Roughtime, Giving Internet Security a Boost" rel="nofollow" href="https://www.wired.com/story/clouldflare-google-roughtime-sync-clocks-security/">Cloudflare Embraces Google Roughtime, Giving Internet Security a Boost</a> &mdash; The internet infrastructure firm Cloudflare will now support a free timekeeping protocol known as Roughtime, which helps synchronize the internet's clocks and validate timestamps.</li><li><a title="Roughtime: Securing Time with Digital Signatures" rel="nofollow" href="https://blog.cloudflare.com/roughtime/">Roughtime: Securing Time with Digital Signatures</a> &mdash; Roughtime lacks the precision of NTP, but aims to be accurate enough for cryptographic applications, and since the responses are authenticated, man-in-the-middle attacks aren’t possible</li><li><a title="Google Cloud rolls out security feature for container images" rel="nofollow" href="https://www.zdnet.com/article/google-cloud-rolls-out-security-feature-for-container-images/">Google Cloud rolls out security feature for container images</a> &mdash; All container images built using Cloud Build, Google's fully-managed CI/CD platform, will now be automatically scanned for OS package vulnerabilities</li><li><a title="Tweets by Matthew Ulasien (@mulasien)" rel="nofollow" href="https://twitter.com/mulasien">Tweets by Matthew Ulasien (@mulasien)</a></li><li><a title="Google Cloud Weekly | 10.03.2018" rel="nofollow" href="https://www.youtube.com/watch?v=iNcg-2TOFbA">Google Cloud Weekly | 10.03.2018</a></li><li><a title="Matthew Ulasien - Quora" rel="nofollow" href="https://www.quora.com/profile/Matthew-Ulasien">Matthew Ulasien - Quora</a></li><li><a title="Google Certified Professional Cloud Architect" rel="nofollow" href="https://linuxacademy.com/linux/training/course/name/google-cloud-platform-architect-essentials">Google Certified Professional Cloud Architect</a></li><li><a title="Feedback: Can&#39;t Even Google This One!" rel="nofollow" href="https://pastebin.com/ufe1KdEX">Feedback: Can't Even Google This One!</a></li><li><a title="Feedback: The Button Pusher Problem" rel="nofollow" href="https://pastebin.com/zcacp8F2">Feedback: The Button Pusher Problem</a></li><li><a title="Feedback: Can I monitor that?" rel="nofollow" href="https://pastebin.com/RYSsLQpj">Feedback: Can I monitor that?</a></li><li><a title="Pingdom" rel="nofollow" href="https://www.pingdom.com/">Pingdom</a></li><li><a title="Site24x7" rel="nofollow" href="https://www.site24x7.com/">Site24x7</a></li><li><a title="prometheus/blackbox_exporter: Blackbox prober exporter" rel="nofollow" href="https://github.com/prometheus/blackbox_exporter">prometheus/blackbox_exporter: Blackbox prober exporter</a></li><li><a title=" Kubernetes the Hard Way - Course" rel="nofollow" href="https://linuxacademy.com/cp/modules/view/id/221"> Kubernetes the Hard Way - Course</a></li><li><a title="How do Kubernetes Deployments work? An adversarial perspective." rel="nofollow" href="https://blog.pulumi.com/how-do-kubernetes-deployments-work-an-adversarial-perspective">How do Kubernetes Deployments work? An adversarial perspective.</a> &mdash; What is happening when a Deployment rolls out a change to your app? What does it actually do when a Pod crashes or is killed? What happens when a Pod is re-labled so that it's not targeted by the Deployment?</li><li><a title="Kubernetes: The Surprisingly Affordable Platform for Personal Projects" rel="nofollow" href="https://www.doxsey.net/blog/kubernetes--the-surprisingly-affordable-platform-for-personal-projects">Kubernetes: The Surprisingly Affordable Platform for Personal Projects</a> &mdash; I think that Kubernetes makes sense for small projects and you can have your own Kubernetes cluster today for as little as $5 a month.</li><li><a title="Kubernetes for personal projects? No thanks!" rel="nofollow" href="https://carlosrdrz.es/kubernetes-for-small-projects/">Kubernetes for personal projects? No thanks!</a> &mdash; I have read multiple times this article about running Kubernetes to run small projects and thought I could share why I think that might not be a great idea.</li><li><a title="KubeDirector: The easy way to run complex stateful applications on Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2018/10/03/kubedirector-the-easy-way-to-run-complex-stateful-applications-on-kubernetes/">KubeDirector: The easy way to run complex stateful applications on Kubernetes</a> &mdash; KubeDirector is an open source project designed to make it easy to run complex stateful scale-out application clusters on Kubernetes.</li><li><a title="Kubernetes On Bare Metal" rel="nofollow" href="https://joshrendek.com/2018/04/kubernetes-on-bare-metal/">Kubernetes On Bare Metal</a> &mdash; This guide will take you from nothing to a 2 node cluster, automatic SSL for deployed apps, a custom PVC/PV storage class using NFS, and a private docker registry.</li><li><a title="Introducing DigitalOcean Kubernetes in Limited Availability" rel="nofollow" href="https://twitter.com/digitalocean/status/1046821669610901509">Introducing DigitalOcean Kubernetes in Limited Availability</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different. </p>

<p>Plus how Google hopes Roughtime will solve one of the web’s biggest problems, some great emails, and more!</p><p>Special Guest: Matt Ulasien.</p><p>Links:</p><ul><li><a title="Cloudflare Embraces Google Roughtime, Giving Internet Security a Boost" rel="nofollow" href="https://www.wired.com/story/clouldflare-google-roughtime-sync-clocks-security/">Cloudflare Embraces Google Roughtime, Giving Internet Security a Boost</a> &mdash; The internet infrastructure firm Cloudflare will now support a free timekeeping protocol known as Roughtime, which helps synchronize the internet's clocks and validate timestamps.</li><li><a title="Roughtime: Securing Time with Digital Signatures" rel="nofollow" href="https://blog.cloudflare.com/roughtime/">Roughtime: Securing Time with Digital Signatures</a> &mdash; Roughtime lacks the precision of NTP, but aims to be accurate enough for cryptographic applications, and since the responses are authenticated, man-in-the-middle attacks aren’t possible</li><li><a title="Google Cloud rolls out security feature for container images" rel="nofollow" href="https://www.zdnet.com/article/google-cloud-rolls-out-security-feature-for-container-images/">Google Cloud rolls out security feature for container images</a> &mdash; All container images built using Cloud Build, Google's fully-managed CI/CD platform, will now be automatically scanned for OS package vulnerabilities</li><li><a title="Tweets by Matthew Ulasien (@mulasien)" rel="nofollow" href="https://twitter.com/mulasien">Tweets by Matthew Ulasien (@mulasien)</a></li><li><a title="Google Cloud Weekly | 10.03.2018" rel="nofollow" href="https://www.youtube.com/watch?v=iNcg-2TOFbA">Google Cloud Weekly | 10.03.2018</a></li><li><a title="Matthew Ulasien - Quora" rel="nofollow" href="https://www.quora.com/profile/Matthew-Ulasien">Matthew Ulasien - Quora</a></li><li><a title="Google Certified Professional Cloud Architect" rel="nofollow" href="https://linuxacademy.com/linux/training/course/name/google-cloud-platform-architect-essentials">Google Certified Professional Cloud Architect</a></li><li><a title="Feedback: Can&#39;t Even Google This One!" rel="nofollow" href="https://pastebin.com/ufe1KdEX">Feedback: Can't Even Google This One!</a></li><li><a title="Feedback: The Button Pusher Problem" rel="nofollow" href="https://pastebin.com/zcacp8F2">Feedback: The Button Pusher Problem</a></li><li><a title="Feedback: Can I monitor that?" rel="nofollow" href="https://pastebin.com/RYSsLQpj">Feedback: Can I monitor that?</a></li><li><a title="Pingdom" rel="nofollow" href="https://www.pingdom.com/">Pingdom</a></li><li><a title="Site24x7" rel="nofollow" href="https://www.site24x7.com/">Site24x7</a></li><li><a title="prometheus/blackbox_exporter: Blackbox prober exporter" rel="nofollow" href="https://github.com/prometheus/blackbox_exporter">prometheus/blackbox_exporter: Blackbox prober exporter</a></li><li><a title=" Kubernetes the Hard Way - Course" rel="nofollow" href="https://linuxacademy.com/cp/modules/view/id/221"> Kubernetes the Hard Way - Course</a></li><li><a title="How do Kubernetes Deployments work? An adversarial perspective." rel="nofollow" href="https://blog.pulumi.com/how-do-kubernetes-deployments-work-an-adversarial-perspective">How do Kubernetes Deployments work? An adversarial perspective.</a> &mdash; What is happening when a Deployment rolls out a change to your app? What does it actually do when a Pod crashes or is killed? What happens when a Pod is re-labled so that it's not targeted by the Deployment?</li><li><a title="Kubernetes: The Surprisingly Affordable Platform for Personal Projects" rel="nofollow" href="https://www.doxsey.net/blog/kubernetes--the-surprisingly-affordable-platform-for-personal-projects">Kubernetes: The Surprisingly Affordable Platform for Personal Projects</a> &mdash; I think that Kubernetes makes sense for small projects and you can have your own Kubernetes cluster today for as little as $5 a month.</li><li><a title="Kubernetes for personal projects? No thanks!" rel="nofollow" href="https://carlosrdrz.es/kubernetes-for-small-projects/">Kubernetes for personal projects? No thanks!</a> &mdash; I have read multiple times this article about running Kubernetes to run small projects and thought I could share why I think that might not be a great idea.</li><li><a title="KubeDirector: The easy way to run complex stateful applications on Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2018/10/03/kubedirector-the-easy-way-to-run-complex-stateful-applications-on-kubernetes/">KubeDirector: The easy way to run complex stateful applications on Kubernetes</a> &mdash; KubeDirector is an open source project designed to make it easy to run complex stateful scale-out application clusters on Kubernetes.</li><li><a title="Kubernetes On Bare Metal" rel="nofollow" href="https://joshrendek.com/2018/04/kubernetes-on-bare-metal/">Kubernetes On Bare Metal</a> &mdash; This guide will take you from nothing to a 2 node cluster, automatic SSL for deployed apps, a custom PVC/PV storage class using NFS, and a private docker registry.</li><li><a title="Introducing DigitalOcean Kubernetes in Limited Availability" rel="nofollow" href="https://twitter.com/digitalocean/status/1046821669610901509">Introducing DigitalOcean Kubernetes in Limited Availability</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 385: 3 Things to Know About Kubernetes</title>
  <link>https://techsnap.systems/385</link>
  <guid isPermaLink="false">f656bfc9-76fe-45b3-b238-3cff6b0acfac</guid>
  <pubDate>Thu, 27 Sep 2018 16:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/f656bfc9-76fe-45b3-b238-3cff6b0acfac.mp3" length="19733765" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.</itunes:subtitle>
  <itunes:duration>23:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.
Plus the privacy improvements that could be coming to HTTPS, and a new SSH auditing tool hits the open source scene. 
 Special Guest: Will Boyd.
</description>
  <itunes:keywords>HASSH, SSH, ESNI, SNI, HTTPS, Cloudflare, Salesforce, Kubernetes, Clonezilla, Kubernetes the hard way, Minikube, kubeadm, Will Boyd, Sysadmin Podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.</p>

<p>Plus the privacy improvements that could be coming to HTTPS, and a new SSH auditing tool hits the open source scene. </p><p>Special Guest: Will Boyd.</p><p>Links:</p><ul><li><a title="Open Sourcing HASSH" rel="nofollow" href="https://engineering.salesforce.com/open-sourcing-hassh-abed3ae5044c">Open Sourcing HASSH</a> &mdash; HASSH is a network fingerprinting standard invented within the Detection Cloud team at Salesforce.</li><li><a title="ESNI: A Privacy-Protecting Upgrade to HTTPS" rel="nofollow" href="https://www.eff.org/deeplinks/2018/09/esni-privacy-protecting-upgrade-https">ESNI: A Privacy-Protecting Upgrade to HTTPS</a> &mdash; Today, Cloudflare is announcing a major step toward closing this privacy hole and enhancing the privacy protections that HTTPS offers. Cloudflare has proposed a technical standard for encrypted SNI, or “ESNI,” which can hide the identities of the sites you visit—particularly when a large number of sites are hosted on a single set of IP addresses</li><li><a title="What&#39;s new in Kubernetes 1.12?" rel="nofollow" href="https://sysdig.com/blog/whats-new-in-kubernetes-1-12/">What's new in Kubernetes 1.12?</a></li><li><a title="Kubernetes the Hard Way" rel="nofollow" href="https://github.com/kelseyhightower/kubernetes-the-hard-way">Kubernetes the Hard Way</a> &mdash; Kubernetes The Hard Way guides you through bootstrapping a highly available Kubernetes cluster with end-to-end encryption between components and RBAC authentication.</li><li><a title="Install Minikube" rel="nofollow" href="https://kubernetes.io/docs/tasks/tools/install-minikube/">Install Minikube</a></li><li><a title="Creating a single master cluster with kubeadm" rel="nofollow" href="https://kubernetes.io/docs/setup/independent/create-cluster-kubeadm/">Creating a single master cluster with kubeadm</a></li><li><a title="10 open-source Kubernetes tools for highly effective SRE and Ops Teams" rel="nofollow" href="https://abhishek-tiwari.com/10-open-source-tools-for-highly-effective-kubernetes-sre-and-ops-teams/">10 open-source Kubernetes tools for highly effective SRE and Ops Teams</a></li><li><a title="Clonezilla" rel="nofollow" href="https://www.clonezilla.org/">Clonezilla</a> &mdash; Clonezilla is a partition and disk imaging/cloning program similar to True Image or Norton Ghost.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.</p>

<p>Plus the privacy improvements that could be coming to HTTPS, and a new SSH auditing tool hits the open source scene. </p><p>Special Guest: Will Boyd.</p><p>Links:</p><ul><li><a title="Open Sourcing HASSH" rel="nofollow" href="https://engineering.salesforce.com/open-sourcing-hassh-abed3ae5044c">Open Sourcing HASSH</a> &mdash; HASSH is a network fingerprinting standard invented within the Detection Cloud team at Salesforce.</li><li><a title="ESNI: A Privacy-Protecting Upgrade to HTTPS" rel="nofollow" href="https://www.eff.org/deeplinks/2018/09/esni-privacy-protecting-upgrade-https">ESNI: A Privacy-Protecting Upgrade to HTTPS</a> &mdash; Today, Cloudflare is announcing a major step toward closing this privacy hole and enhancing the privacy protections that HTTPS offers. Cloudflare has proposed a technical standard for encrypted SNI, or “ESNI,” which can hide the identities of the sites you visit—particularly when a large number of sites are hosted on a single set of IP addresses</li><li><a title="What&#39;s new in Kubernetes 1.12?" rel="nofollow" href="https://sysdig.com/blog/whats-new-in-kubernetes-1-12/">What's new in Kubernetes 1.12?</a></li><li><a title="Kubernetes the Hard Way" rel="nofollow" href="https://github.com/kelseyhightower/kubernetes-the-hard-way">Kubernetes the Hard Way</a> &mdash; Kubernetes The Hard Way guides you through bootstrapping a highly available Kubernetes cluster with end-to-end encryption between components and RBAC authentication.</li><li><a title="Install Minikube" rel="nofollow" href="https://kubernetes.io/docs/tasks/tools/install-minikube/">Install Minikube</a></li><li><a title="Creating a single master cluster with kubeadm" rel="nofollow" href="https://kubernetes.io/docs/setup/independent/create-cluster-kubeadm/">Creating a single master cluster with kubeadm</a></li><li><a title="10 open-source Kubernetes tools for highly effective SRE and Ops Teams" rel="nofollow" href="https://abhishek-tiwari.com/10-open-source-tools-for-highly-effective-kubernetes-sre-and-ops-teams/">10 open-source Kubernetes tools for highly effective SRE and Ops Teams</a></li><li><a title="Clonezilla" rel="nofollow" href="https://www.clonezilla.org/">Clonezilla</a> &mdash; Clonezilla is a partition and disk imaging/cloning program similar to True Image or Norton Ghost.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 370: Hidden in Plain Sight</title>
  <link>https://techsnap.systems/370</link>
  <guid isPermaLink="false">cbe34348-d2f2-41f1-8480-38bdbc5dd8ce</guid>
  <pubDate>Fri, 01 Jun 2018 08:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cbe34348-d2f2-41f1-8480-38bdbc5dd8ce.mp3" length="43765885" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.</itunes:subtitle>
  <itunes:duration>51:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.
Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should know about. 
</description>
  <content:encoded>
    <![CDATA[<p>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.</p>

<p>Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should know about.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hiding Information in Plain Text - IEEE Spectrum" rel="nofollow" href="https://spectrum.ieee.org/tech-talk/computing/software/hiding-information-in-plain-text">Hiding Information in Plain Text - IEEE Spectrum</a></li><li><a title="Remediating the May 2018 Git Security Vulnerability – Microsoft DevOps Blog" rel="nofollow" href="https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/">Remediating the May 2018 Git Security Vulnerability – Microsoft DevOps Blog</a></li><li><a title="When to use git subtree? - Stack Overflow" rel="nofollow" href="https://stackoverflow.com/questions/32407634/when-to-use-git-subtree">When to use git subtree? - Stack Overflow</a></li><li><a title="Ghostery Email Incident Update - Ghostery" rel="nofollow" href="https://www.ghostery.com/blog/ghostery-news/ghostery-email-incident-update/">Ghostery Email Incident Update - Ghostery</a></li><li><a title="Surprise! Student receives $36,000 Google bug bounty for RCE flaw – Naked Security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/05/23/surprise-student-receives-36000-google-bug-bounty-for-rce-flaw/">Surprise! Student receives $36,000 Google bug bounty for RCE flaw – Naked Security</a></li><li><a title="SS7 routing-protocol breach of US cellular carrier exposed customer data | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/nefarious-actors-may-have-abused-routing-protocol-to-spy-on-us-phone-users/">SS7 routing-protocol breach of US cellular carrier exposed customer data | Ars Technica</a></li><li><a title="SnoopSnitch - Apps on Google Play" rel="nofollow" href="https://play.google.com/store/apps/details?id=de.srlabs.snoopsnitch&amp;hl=en_US">SnoopSnitch - Apps on Google Play</a></li><li><a title="Kubernetes Containerd Integration Goes GA - Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2018/05/24/kubernetes-containerd-integration-goes-ga/">Kubernetes Containerd Integration Goes GA - Kubernetes</a></li><li><a title="Hackers infect 500,000 consumer routers all over the world with malware | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/hackers-infect-500000-consumer-routers-all-over-the-world-with-malware/">Hackers infect 500,000 consumer routers all over the world with malware | Ars Technica</a></li><li><a title="FBI seizes domain Russia allegedly used to infect 500,000 consumer routers | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/fbi-seizes-server-russia-allegedly-used-to-infect-500000-consumer-routers/">FBI seizes domain Russia allegedly used to infect 500,000 consumer routers | Ars Technica</a></li><li><a title="Singapore ISP Leaves 1,000 Routers Open to Attack | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/singapore-isp-leaves-1000-routers-open-to-attack/132315/">Singapore ISP Leaves 1,000 Routers Open to Attack | Threatpost | The first stop for security news</a></li><li><a title="Don&#39;t let Frank near the server" rel="nofollow" href="https://pastebin.com/sM9QicJE">Don't let Frank near the server</a></li><li><a title="Dave decides to move some plugs... " rel="nofollow" href="https://pastebin.com/PCNtN439">Dave decides to move some plugs... </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.</p>

<p>Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should know about.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hiding Information in Plain Text - IEEE Spectrum" rel="nofollow" href="https://spectrum.ieee.org/tech-talk/computing/software/hiding-information-in-plain-text">Hiding Information in Plain Text - IEEE Spectrum</a></li><li><a title="Remediating the May 2018 Git Security Vulnerability – Microsoft DevOps Blog" rel="nofollow" href="https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/">Remediating the May 2018 Git Security Vulnerability – Microsoft DevOps Blog</a></li><li><a title="When to use git subtree? - Stack Overflow" rel="nofollow" href="https://stackoverflow.com/questions/32407634/when-to-use-git-subtree">When to use git subtree? - Stack Overflow</a></li><li><a title="Ghostery Email Incident Update - Ghostery" rel="nofollow" href="https://www.ghostery.com/blog/ghostery-news/ghostery-email-incident-update/">Ghostery Email Incident Update - Ghostery</a></li><li><a title="Surprise! Student receives $36,000 Google bug bounty for RCE flaw – Naked Security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/05/23/surprise-student-receives-36000-google-bug-bounty-for-rce-flaw/">Surprise! Student receives $36,000 Google bug bounty for RCE flaw – Naked Security</a></li><li><a title="SS7 routing-protocol breach of US cellular carrier exposed customer data | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/nefarious-actors-may-have-abused-routing-protocol-to-spy-on-us-phone-users/">SS7 routing-protocol breach of US cellular carrier exposed customer data | Ars Technica</a></li><li><a title="SnoopSnitch - Apps on Google Play" rel="nofollow" href="https://play.google.com/store/apps/details?id=de.srlabs.snoopsnitch&amp;hl=en_US">SnoopSnitch - Apps on Google Play</a></li><li><a title="Kubernetes Containerd Integration Goes GA - Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2018/05/24/kubernetes-containerd-integration-goes-ga/">Kubernetes Containerd Integration Goes GA - Kubernetes</a></li><li><a title="Hackers infect 500,000 consumer routers all over the world with malware | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/hackers-infect-500000-consumer-routers-all-over-the-world-with-malware/">Hackers infect 500,000 consumer routers all over the world with malware | Ars Technica</a></li><li><a title="FBI seizes domain Russia allegedly used to infect 500,000 consumer routers | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/fbi-seizes-server-russia-allegedly-used-to-infect-500000-consumer-routers/">FBI seizes domain Russia allegedly used to infect 500,000 consumer routers | Ars Technica</a></li><li><a title="Singapore ISP Leaves 1,000 Routers Open to Attack | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/singapore-isp-leaves-1000-routers-open-to-attack/132315/">Singapore ISP Leaves 1,000 Routers Open to Attack | Threatpost | The first stop for security news</a></li><li><a title="Don&#39;t let Frank near the server" rel="nofollow" href="https://pastebin.com/sM9QicJE">Don't let Frank near the server</a></li><li><a title="Dave decides to move some plugs... " rel="nofollow" href="https://pastebin.com/PCNtN439">Dave decides to move some plugs... </a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 368: EFail Explained</title>
  <link>https://techsnap.systems/368</link>
  <guid isPermaLink="false">810af786-1ddc-475f-82e7-65a38debf64e</guid>
  <pubDate>Tue, 15 May 2018 12:45:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/810af786-1ddc-475f-82e7-65a38debf64e.mp3" length="31418868" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>The EFail hype-train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.</itunes:subtitle>
  <itunes:duration>36:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>The EFail hype-train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.
Plus things  to consider when deciding on-premises vs a cloud deployment, and the all business gadget from 1971 that kicked off the consumer electronics revolution.  
</description>
  <content:encoded>
    <![CDATA[<p>The EFail hype-train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.</p>

<p>Plus things  to consider when deciding on-premises vs a cloud deployment, and the all business gadget from 1971 that kicked off the consumer electronics revolution. </p><p>Links:</p><ul><li><a title="The HP-35" rel="nofollow" href="http://codex99.com/design/the-hp35.html">The HP-35</a> &mdash; Consumer Electronics, an Origin Story</li><li><a title="The people cost of building out a Kubernetes cluster on-prem | Operos" rel="nofollow" href="https://www.paxautoma.com/blog/2018/02/28/the-people-cost-of-building-out-kubernetes-cluster-on-prem.html">The people cost of building out a Kubernetes cluster on-prem | Operos</a></li><li><a title="EFAIL" rel="nofollow" href="https://efail.de/">EFAIL</a> &mdash; EFAIL describes vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME that leak the plaintext of encrypted emails. </li><li><a title="efail-attack-paper.pdf" rel="nofollow" href="https://efail.de/efail-attack-paper.pdf">efail-attack-paper.pdf</a></li><li><a title="GnuPG Efail press release Response " rel="nofollow" href="https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html">GnuPG Efail press release Response </a></li><li><a title="No, PGP is not broken, not even with the Efail vulnerabilities - ProtonMail Blog" rel="nofollow" href="https://protonmail.com/blog/pgp-vulnerability-efail/">No, PGP is not broken, not even with the Efail vulnerabilities - ProtonMail Blog</a> &mdash; Recently, news broke about potential vulnerabilities in PGP, dubbed Efail. However, despite reports to the contrary, PGP is not actually broken, as we will explain in this post.</li><li><a title="Eric&#39;s War Story is VERY Familiar" rel="nofollow" href="https://pastebin.com/509aJ1PN">Eric's War Story is VERY Familiar</a></li><li><a title="When it rains it pours for Steve" rel="nofollow" href="https://pastebin.com/cMiJQANX">When it rains it pours for Steve</a></li><li><a title="Critical Cisco WebEx Bug Allows Remote Code Execution " rel="nofollow" href="https://threatpost.com/critical-cisco-webex-bug-allows-remote-code-execution/131657/?utm_campaign=Security%2BNewsletter&amp;utm_source=Security_Newsletter_co_76">Critical Cisco WebEx Bug Allows Remote Code Execution </a></li><li><a title="Cisco WebEx and 3rd Party Support Utilities" rel="nofollow" href="https://collaborationhelp.cisco.com/article/en-us/WBX000026396">Cisco WebEx and 3rd Party Support Utilities</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The EFail hype-train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.</p>

<p>Plus things  to consider when deciding on-premises vs a cloud deployment, and the all business gadget from 1971 that kicked off the consumer electronics revolution. </p><p>Links:</p><ul><li><a title="The HP-35" rel="nofollow" href="http://codex99.com/design/the-hp35.html">The HP-35</a> &mdash; Consumer Electronics, an Origin Story</li><li><a title="The people cost of building out a Kubernetes cluster on-prem | Operos" rel="nofollow" href="https://www.paxautoma.com/blog/2018/02/28/the-people-cost-of-building-out-kubernetes-cluster-on-prem.html">The people cost of building out a Kubernetes cluster on-prem | Operos</a></li><li><a title="EFAIL" rel="nofollow" href="https://efail.de/">EFAIL</a> &mdash; EFAIL describes vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME that leak the plaintext of encrypted emails. </li><li><a title="efail-attack-paper.pdf" rel="nofollow" href="https://efail.de/efail-attack-paper.pdf">efail-attack-paper.pdf</a></li><li><a title="GnuPG Efail press release Response " rel="nofollow" href="https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html">GnuPG Efail press release Response </a></li><li><a title="No, PGP is not broken, not even with the Efail vulnerabilities - ProtonMail Blog" rel="nofollow" href="https://protonmail.com/blog/pgp-vulnerability-efail/">No, PGP is not broken, not even with the Efail vulnerabilities - ProtonMail Blog</a> &mdash; Recently, news broke about potential vulnerabilities in PGP, dubbed Efail. However, despite reports to the contrary, PGP is not actually broken, as we will explain in this post.</li><li><a title="Eric&#39;s War Story is VERY Familiar" rel="nofollow" href="https://pastebin.com/509aJ1PN">Eric's War Story is VERY Familiar</a></li><li><a title="When it rains it pours for Steve" rel="nofollow" href="https://pastebin.com/cMiJQANX">When it rains it pours for Steve</a></li><li><a title="Critical Cisco WebEx Bug Allows Remote Code Execution " rel="nofollow" href="https://threatpost.com/critical-cisco-webex-bug-allows-remote-code-execution/131657/?utm_campaign=Security%2BNewsletter&amp;utm_source=Security_Newsletter_co_76">Critical Cisco WebEx Bug Allows Remote Code Execution </a></li><li><a title="Cisco WebEx and 3rd Party Support Utilities" rel="nofollow" href="https://collaborationhelp.cisco.com/article/en-us/WBX000026396">Cisco WebEx and 3rd Party Support Utilities</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 353: Too Many Containers</title>
  <link>https://techsnap.systems/353</link>
  <guid isPermaLink="false">76cf88a2-f5d9-4dba-b314-f9f00e3767df</guid>
  <pubDate>Thu, 25 Jan 2018 16:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/76cf88a2-f5d9-4dba-b314-f9f00e3767df.mp3" length="31823746" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.</itunes:subtitle>
  <itunes:duration>43:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.
Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.
</description>
  <content:encoded>
    <![CDATA[<p>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.</p>

<p>Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="DNSFS. Store your files in others DNS resolver caches" rel="nofollow" href="https://blog.benjojo.co.uk/post/dns-filesystem-true-cloud-storage-dnsfs">DNSFS. Store your files in others DNS resolver caches</a> &mdash; The DNSFS code is a relatively simple system, every file uploaded is split into 180 byte chunks, and those chunks are “set” inside caches by querying the DNSFS node via the public resolver for a TXT record. After a few seconds the data is removed from DNSFS memory and the data is no longer on the client computer.</li><li><a title="BPF - the forgotten bytecode" rel="nofollow" href="https://blog.cloudflare.com/bpf-the-forgotten-bytecode/">BPF - the forgotten bytecode</a> &mdash; BPF is an absolutely marvelous and flexible way of filtering packets.</li><li><a title="dnsfs: Store your data in others DNS revolvers cache" rel="nofollow" href="https://github.com/benjojo/dnsfs">dnsfs: Store your data in others DNS revolvers cache</a> &mdash; Store your data in others DNS revolvers cache</li><li><a title="Unauthenticated LAN remote code execution in AsusWRT" rel="nofollow" href="https://raw.githubusercontent.com/pedrib/PoC/master/advisories/asuswrt-lan-rce.txt">Unauthenticated LAN remote code execution in AsusWRT</a> &mdash; However due to a number of coding errors, it is possible for an unauthenticated attacker in the LAN to achieve remote code execution in the router as the root user.</li><li><a title="AI is moving towards acceptance in cyber security, says Check Point" rel="nofollow" href="http://www.computerweekly.com/news/252433705/AI-is-moving-towards-acceptance-in-cyber-security-says-Check-Point">AI is moving towards acceptance in cyber security, says Check Point</a> &mdash; Artificial intelligence is well on its way to being a useful tool in the cyber security professional’s kit, but according to Check Point, there are still big challenges to overcome.</li><li><a title="Alphabet is launching a new CyberSecurity unit." rel="nofollow" href="https://www.linkedin.com/pulse/alphabet-launching-new-cybersecurity-unit-justin-sleight/">Alphabet is launching a new CyberSecurity unit.</a> &mdash; Alphabet, the parent company of Google, announced today that they will be launching Chronicle, a new business unit that will focus on Cyber Security, using their servers and infrastructure. The new organization hopes to focus on machine learning and artificial intelligence to assist in the fight against cybercrime moving forward.

</li><li><a title="Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users&#39; PCs" rel="nofollow" href="https://www.v3.co.uk/v3-uk/news/3024532/google-project-zero-claims-new-bittorrent-flaw-could-enable-cyber-crooks-get-into-users-pcs">Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users' PCs</a> &mdash; According to Project Zero, the client is vulnerable to a DNS re-binding attack that effectively tricks the PC into accepting requests via port 9091 from malicious websites that it would (and should) ordinarly ignore. </li><li><a title="CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468" rel="nofollow" href="https://github.com/transmission/transmission/pull/468">CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468</a></li><li><a title="Blizzard Fixes DNS Rebinding Flaw that Put All the Company&#39;s Users at Risk" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/blizzard-fixes-dns-rebinding-flaw-that-put-all-the-companys-users-at-risk/">Blizzard Fixes DNS Rebinding Flaw that Put All the Company's Users at Risk</a></li><li><a title="What is DNS rebinding, in layman&#39;s terms?" rel="nofollow" href="https://www.quora.com/What-is-DNS-rebinding-in-laymans-terms">What is DNS rebinding, in layman's terms?</a></li><li><a title="An Introduction to Kubernetes" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-kubernetes">An Introduction to Kubernetes</a> &mdash; Kubernetes, at its basic level, is a system for managing containerized applications across a cluster of nodes. In many ways, Kubernetes was designed to address the disconnect between the way that modern, clustered infrastructure is designed, and some of the assumptions that most applications and services have about their environments.</li><li><a title="What is Kubernetes?" rel="nofollow" href="https://www.redhat.com/en/topics/containers/what-is-kubernetes">What is Kubernetes?</a> &mdash; Kubernetes was originally developed and designed by engineers at Google. Google was one of the early contributors to Linux container technology and has talked publicly about how everything at Google runs in containers. (This is the technology behind Google’s cloud services.) Google generates more than 2 billion container deployments a week—all powered by an internal platform: Borg. Borg was the predecessor to Kubernetes and the lessons learned from developing Borg over the years became the primary influence behind much of the Kubernetes technology.</li><li><a title="Scaling Kubernetes to 2,500 Nodes" rel="nofollow" href="https://blog.openai.com/scaling-kubernetes-to-2500-nodes/">Scaling Kubernetes to 2,500 Nodes</a> &mdash; We’ve been running Kubernetes for deep learning research for over two years. While our largest-scale workloads manage bare cloud VMs directly, Kubernetes provides a fast iteration cycle, reasonable scalability, and a lack of boilerplate which makes it ideal for most of our experiments.</li><li><a title="Feedback: Talk more about Windows" rel="nofollow" href="https://slexy.org/view/s21GdmdxDs">Feedback: Talk more about Windows</a> &mdash; I listened to your intro to change management and it seemed like it will be very Linux centric ("everything is she"). I'm future segments, please try to include windows desktop and server OS as well.</li><li><a title="Question: Starting with Ansible Quick" rel="nofollow" href="https://slexy.org/view/s2sGYopuRw">Question: Starting with Ansible Quick</a> &mdash; Are there any way to get started other than writing a playbook and trying it out with trial and error?</li><li><a title="Ansible Best Practises: A project structure that outlines some best practises of how to use ansible" rel="nofollow" href="https://github.com/enginyoyen/ansible-best-practises">Ansible Best Practises: A project structure that outlines some best practises of how to use ansible</a> &mdash; A project structure that outlines some best practises of how to use ansible</li><li><a title="ansible-console: An Interactive REPL for Ansible" rel="nofollow" href="https://yobriefca.se/blog/2017/01/10/ansible-console-an-interactive-repl-for-ansible/">ansible-console: An Interactive REPL for Ansible</a> &mdash; omething found out recently is that Ansible has an interactive REPL of sorts in ansible-console for doing some adhoc things on a collection of hosts.</li><li><a title="Introduction To Ad-Hoc Commands — Ansible Documentation" rel="nofollow" href="http://docs.ansible.com/ansible/latest/intro_adhoc.html">Introduction To Ad-Hoc Commands — Ansible Documentation</a> &mdash; An ad-hoc command is something that you might type in to do something really quick, but don’t want to save for later.

</li><li><a title="About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support" rel="nofollow" href="https://support.apple.com/en-us/HT208465">About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support</a> &mdash; This document describes the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.</p>

<p>Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="DNSFS. Store your files in others DNS resolver caches" rel="nofollow" href="https://blog.benjojo.co.uk/post/dns-filesystem-true-cloud-storage-dnsfs">DNSFS. Store your files in others DNS resolver caches</a> &mdash; The DNSFS code is a relatively simple system, every file uploaded is split into 180 byte chunks, and those chunks are “set” inside caches by querying the DNSFS node via the public resolver for a TXT record. After a few seconds the data is removed from DNSFS memory and the data is no longer on the client computer.</li><li><a title="BPF - the forgotten bytecode" rel="nofollow" href="https://blog.cloudflare.com/bpf-the-forgotten-bytecode/">BPF - the forgotten bytecode</a> &mdash; BPF is an absolutely marvelous and flexible way of filtering packets.</li><li><a title="dnsfs: Store your data in others DNS revolvers cache" rel="nofollow" href="https://github.com/benjojo/dnsfs">dnsfs: Store your data in others DNS revolvers cache</a> &mdash; Store your data in others DNS revolvers cache</li><li><a title="Unauthenticated LAN remote code execution in AsusWRT" rel="nofollow" href="https://raw.githubusercontent.com/pedrib/PoC/master/advisories/asuswrt-lan-rce.txt">Unauthenticated LAN remote code execution in AsusWRT</a> &mdash; However due to a number of coding errors, it is possible for an unauthenticated attacker in the LAN to achieve remote code execution in the router as the root user.</li><li><a title="AI is moving towards acceptance in cyber security, says Check Point" rel="nofollow" href="http://www.computerweekly.com/news/252433705/AI-is-moving-towards-acceptance-in-cyber-security-says-Check-Point">AI is moving towards acceptance in cyber security, says Check Point</a> &mdash; Artificial intelligence is well on its way to being a useful tool in the cyber security professional’s kit, but according to Check Point, there are still big challenges to overcome.</li><li><a title="Alphabet is launching a new CyberSecurity unit." rel="nofollow" href="https://www.linkedin.com/pulse/alphabet-launching-new-cybersecurity-unit-justin-sleight/">Alphabet is launching a new CyberSecurity unit.</a> &mdash; Alphabet, the parent company of Google, announced today that they will be launching Chronicle, a new business unit that will focus on Cyber Security, using their servers and infrastructure. The new organization hopes to focus on machine learning and artificial intelligence to assist in the fight against cybercrime moving forward.

</li><li><a title="Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users&#39; PCs" rel="nofollow" href="https://www.v3.co.uk/v3-uk/news/3024532/google-project-zero-claims-new-bittorrent-flaw-could-enable-cyber-crooks-get-into-users-pcs">Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users' PCs</a> &mdash; According to Project Zero, the client is vulnerable to a DNS re-binding attack that effectively tricks the PC into accepting requests via port 9091 from malicious websites that it would (and should) ordinarly ignore. </li><li><a title="CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468" rel="nofollow" href="https://github.com/transmission/transmission/pull/468">CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468</a></li><li><a title="Blizzard Fixes DNS Rebinding Flaw that Put All the Company&#39;s Users at Risk" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/blizzard-fixes-dns-rebinding-flaw-that-put-all-the-companys-users-at-risk/">Blizzard Fixes DNS Rebinding Flaw that Put All the Company's Users at Risk</a></li><li><a title="What is DNS rebinding, in layman&#39;s terms?" rel="nofollow" href="https://www.quora.com/What-is-DNS-rebinding-in-laymans-terms">What is DNS rebinding, in layman's terms?</a></li><li><a title="An Introduction to Kubernetes" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-kubernetes">An Introduction to Kubernetes</a> &mdash; Kubernetes, at its basic level, is a system for managing containerized applications across a cluster of nodes. In many ways, Kubernetes was designed to address the disconnect between the way that modern, clustered infrastructure is designed, and some of the assumptions that most applications and services have about their environments.</li><li><a title="What is Kubernetes?" rel="nofollow" href="https://www.redhat.com/en/topics/containers/what-is-kubernetes">What is Kubernetes?</a> &mdash; Kubernetes was originally developed and designed by engineers at Google. Google was one of the early contributors to Linux container technology and has talked publicly about how everything at Google runs in containers. (This is the technology behind Google’s cloud services.) Google generates more than 2 billion container deployments a week—all powered by an internal platform: Borg. Borg was the predecessor to Kubernetes and the lessons learned from developing Borg over the years became the primary influence behind much of the Kubernetes technology.</li><li><a title="Scaling Kubernetes to 2,500 Nodes" rel="nofollow" href="https://blog.openai.com/scaling-kubernetes-to-2500-nodes/">Scaling Kubernetes to 2,500 Nodes</a> &mdash; We’ve been running Kubernetes for deep learning research for over two years. While our largest-scale workloads manage bare cloud VMs directly, Kubernetes provides a fast iteration cycle, reasonable scalability, and a lack of boilerplate which makes it ideal for most of our experiments.</li><li><a title="Feedback: Talk more about Windows" rel="nofollow" href="https://slexy.org/view/s21GdmdxDs">Feedback: Talk more about Windows</a> &mdash; I listened to your intro to change management and it seemed like it will be very Linux centric ("everything is she"). I'm future segments, please try to include windows desktop and server OS as well.</li><li><a title="Question: Starting with Ansible Quick" rel="nofollow" href="https://slexy.org/view/s2sGYopuRw">Question: Starting with Ansible Quick</a> &mdash; Are there any way to get started other than writing a playbook and trying it out with trial and error?</li><li><a title="Ansible Best Practises: A project structure that outlines some best practises of how to use ansible" rel="nofollow" href="https://github.com/enginyoyen/ansible-best-practises">Ansible Best Practises: A project structure that outlines some best practises of how to use ansible</a> &mdash; A project structure that outlines some best practises of how to use ansible</li><li><a title="ansible-console: An Interactive REPL for Ansible" rel="nofollow" href="https://yobriefca.se/blog/2017/01/10/ansible-console-an-interactive-repl-for-ansible/">ansible-console: An Interactive REPL for Ansible</a> &mdash; omething found out recently is that Ansible has an interactive REPL of sorts in ansible-console for doing some adhoc things on a collection of hosts.</li><li><a title="Introduction To Ad-Hoc Commands — Ansible Documentation" rel="nofollow" href="http://docs.ansible.com/ansible/latest/intro_adhoc.html">Introduction To Ad-Hoc Commands — Ansible Documentation</a> &mdash; An ad-hoc command is something that you might type in to do something really quick, but don’t want to save for later.

</li><li><a title="About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support" rel="nofollow" href="https://support.apple.com/en-us/HT208465">About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support</a> &mdash; This document describes the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan.

</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
