IT Pro Tuesday #248
Get this in your inbox each week.
Welcome back to IT Pro Tuesday!
We are thrilled to announce the launch of our new podcast: The Security Swarm Podcast, hosted by our very own Andy Syrewicze!
What to expect?
The podcast is a weekly conversation of the most critical issues facing the world of cybersecurity today. Each episode delves deep into a pertinent topic, dissected by an industry expert, and backed up by real data straight from our Security Lab.
You can listen on all your favorite platforms, including Spotify, Google Podcasts, Apple Podcasts or directly from our website.
We're also looking for your favorite tips and tools we can share with the community... those that help you do your job better and more easily. Please reply or leave a comment with your suggestions, and we'll be featuring them in the coming weeks.
As always, we’re updating the full list on our website here. Enjoy.
Cheat Sheets
Linux Cheat Sheets offers a large selection of concise cheat sheets nicely organized to cover all the various categories of Linux commands, so you can give your Google-fu a rest in finding what slips from your memory. Kindly shared by LinuxBook.
A Free Tool
Sydi is an open-source tool that assists with documenting your network. It collects data from servers and network equipment and then generates a report that is intended to serve as a foundation to more-easily create good documentation. pc_load_letter_in_SD adds, "It's an older tool, but it's always been a favorite of mine."
A Training Resource
Play with Docker Classroom is a playground for learning how to work with Docker. Provides a free, cloud version of an Alpine Linux VM on which to build and run Docker containers as well as an opportunity for playing with more-advanced features like cluster creation via Swarm Mode. Our thanks for the recommendation go to mirrax.
Another Free Tool
Ásbrú Connection Manager helps to organize your remote terminal sessions and automate repetitive tasks. Offers a simple GUI for managing remote connections, scripting possibilities; configurable pre/post connection local command execution, list of commands for local execution, and list of conditional executions on the connected machine; KeePassX integration; ability to connect via Proxy server; cluster connections; tabbed/windowed terminals and more. Thanks to d033y2yk for the suggestion.
A Security List
Known Exploited Vulnerabilities Catalog is the home of CISA's current list of critical system security holes that should be addressed within any organization. HanSolo71 suggests checking it to "make sure your vulnerability scanners are looking for systems you missed, and get them patched ASAP."
P.S. Bonus Free Tools
eBPF is an open-source tool for running sandboxed programs in a privileged setting, like the OS kernel. Allows you to safely extend the kernel capabilities without the need to adapt kernel source code or load kernel modules. Credit for this one goes to Miserygut.
fd is a fast, user-friendly alternative to "find" for locating entries in your filesystem, with "sensible" defaults for most use cases. Features intuitive syntax, regular expression and glob-based patterns, parallelized directory traversal, color coding for different file types, support for parallel command execution and more. Appreciated by vbd.
Have a fantastic week and as usual, let us know any comments.