-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on May 27, 2023


Programming Leftovers

Microsoft Windows TCO and Attacks on GNU/Linux (EEE Method)



Google Cloud Users Can Now Automate TLS Certificate Lifecycle


↺ Google Cloud Users Can Now Automate TLS Certificate Lifecycle


> Google makes ACME API available to all Google Cloud users to allow them to automatically acquire and renew TLS certificates for free.



Phishing Domains Tanked After Meta Sued Freenom


↺ Phishing Domains Tanked After Meta Sued Freenom


> The number of phishing websites tied to domain name registrar Freenom dropped precipitously in the months surrounding a recent lawsuit from social networking giant Meta, which alleged the free domain name provider has a long history of ignoring abuse complaints about phishing websites while monetizing traffic to those abusive domains.



Zyxel Firewalls Hacked by Mirai Botnet


↺ Zyxel Firewalls Hacked by Mirai Botnet


> A Mirai botnet has been exploiting a recently patched vulnerability tracked as CVE-2023-28771 to hack many Zyxel firewalls.



How to secure your MLOps tooling?


↺ How to secure your MLOps tooling?


> Production-grade AI initiatives are not an easy task. Organisations need to go through different stages to prepare data, develop the model and deploy it. Reproducibility and portability are essential for such projects. This is where machine learning operations (MLOps) can help.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Thu Jun 13 07:53:13 2024