We selected security as the main topic for this BSD issue because it is one of the most often repeated needs nowadays. We all want security, not only in our virtual world, but also in our real-life situations.
The article I will recommend is titled Building a PCI Compliant Infrastructure on AWS by Renan Dias. He will be building a quite complex AWS infrastructure and he will be deploying an application called Guestbook. The article is long, but I decided not to share it into two issues to make your life easier and give you the full guidelines on how to secure yourself. I hope you enjoy reading it and start building your own infrastructure on AWS.
The next article will help you secure your IT world. It is AWS Infrastructure Security: Deep Dive into Access Control Management by Mohamed Farag. In his article, Mohamed introduces you to various considerations with access control management in AWS infrastructure. You will learn different tips and tricks to think through the security of your access control management and exploit a wide-variety of tools to improve your organization’s security infrastructure. And do not omit the Password Cracking in UNIX article by Amit Chugh. I hope you will find some more support to for your individual projects.
If you want to start with Raspberry Pi and don’t know how, just go to the next pages to read the article Ready to Land on IoT World with the Raspberry Pi 3 by Manuel Daza.
The next article worth reading is Elastix On Bhyve by Abdorrahman Homaei. I would like to add that Abdorrahman Homaei’s articles will be published by the BSD magazine more regularly, so if you like his writing, please contact him to give some feedback for future articles.
We also have a new blog presentation. I think that you know him very well. This month you can meet Hubert Feyrer.
Of course, please do not forget to see our interview for this issue. This time Kalin Staykov responds to our questions. Check out what he thinks about DevOps.
Also, I would like to invite you to read the column by Rob Somerville. It is always a good read.
As long as we have our precious readers, we have a purpose. We owe you a huge THANK YOU! We are grateful for every comment and opinion, either positive or negative. Every word from you lets us improve BSD magazine and brings us closer to the ideal shape of our publication.
Ewa & The BSD Team
Ewa Dudzic & The BSD Team
This column presents the latest news coverage of events, product releases and trending topics.
Building a PCI Compliant Infrastructure on AWS
PCI DSS is a security standard for companies that deal with credit card information from schemes like MasterCard, Visa, American Express, JCB and Discover. However, even if your company does not handle any credit card information, it would still be a great idea to implement some of PCI’s security standards. In this article, Renan will focus on PCI DSS.
AWS Infrastructure Security: Deep Dive Into Access Control Management
Mohamed introduces you to various considerations with access control management in AWS infrastructure. You
will learn different tips and tricks to think through the security of your access control management and exploit
wide-variety of tools to improve your organization’s security infrastructure.
Password Cracking in UNIX
Passwords are used for performing authentication. The system can be authenticated using different ways like something which user knows (passwords), something that user has (identification token), or something which the user is (biometric). The password can be changed easily in case one finds that the same is compromised. In this paper, Amit will talk about various password cracking tools available for cracking password in UNIX environment.
Elastix on Bhyve
Elastix installation is easy, but if you want to use FXO/FXS PCI-E hardware,you have to know about Bhyve PCI Passthrough.The Bhyve hypervisor supports the passing of PCI devices belonging to the host through to a virtual machine for its exclusive use of them.
Ready to Land on IoT World with the Raspberry Pi 3
Manuel acquired the Raspberry Pi 3 a few months ago. It’s not their latest model, where again the power and speed have been slightly increased. In this Pi 3 model, the main improvement face the previous versions, was the inclusion of WiFi and Bluetooth modules on the same board, which made it no longer necessary to connect a USB to provide these capabilities. And with this, he started his journey.
UNIX BLOG PRESENTATION
hubertf’s NetBSD Blog
Interview with Kalin Staykov
With the wounds still open after another heinous terror attack in the heart of London, calls are already being made that security services must be able to decrypt messages from the Facebook owned service, WhatsApp. In light of the recent revelations of CIA back-doors in smart televisions, is this bluff, rhetoric, or a call for further political clampdown on free speech?
|BSD Magazine 3/2017 (91) (iBook)|
|BSD Magazine 3 /2017 (91) (PDF)|