Thứ Tư, 1 tháng 8, 2018

Youtube daily up Aug 1 2018

hello everyone its Kelly Hampton I thought I would share with you today

Archangel Michael's guidance about aging and the realities that we can look

forward to so I would like to begin Archangel Michael recently shared with

me we have been working toward this evolution the idea that humans will live

up to 200 years of age and 80 year olds will look like 50 year olds and that

aging is not inevitable, that's the evolution we've been working toward with

mankind for over 350,000 years since the earliest of times, revolutionary

advancements have been more recently made in the last 300 years with more

advances heightened dramatically over the last 10 to 15 years

do you know dear ones that souls and other dimensions have lifespans into

their hundreds easily, do you also know that the Theolosians living in pockets of

your earth, but most noticeably underground Mount Shasta California have

a healthy life span over 600 years, by the way if you're just listening to this

I'll be leading my fourth retreat to Mount Shasta California this September

and you're welcome to of course visit my web site if it moves you to see when the

next retreats will be, it's a wonderful magical place, to continue, also many of

the so-called lost civilizations such as Lemuria, Atlantis and others were known

to have been referred to as ageless so you see the concept of present human

aging is not a new concept, what is newer is your world's coming of

age, how is this done you may ask, Michael continued to say,

it's done through a variety of means, gene-splicing is one way, removal of

implants is another which is a large part of what is done through the star

Healing intergalactic energy system, which, if you're not familiar with that

system that was shared with me by Archangel Michael in 2010, to continue to

Michael's guidance, purifying all toxins is another, elevated thinking is another

these are means of youth-ing ourselves, some of them anyway, he goes on

to tell us that the removal of implants allows human and animal cells to return

the original god state free from disease and dysfunction, and again from my work

on my standpoint that's done through the star healing intergalactic energy

healing system which is fifth dimensional, ninth dimensional, 33rd

dimensional in nature, it is not impossible for mankind to easily

live into their hundreds and Beyond pain-free and without decay, as a result

this will be our world in twenty to thirty years, some are experiencing this

now, with systems like the star healing intergalactic energy allowing for this

possibility to occur sooner than later by also restructuring the mind and by

removing any additional implants there, so I do plan to do some additional

teachings on my channel here in greater detail about how the star system

does that, to continue Michael shared this last one, elevated thinking is not a

new concept either, what one thinks one becomes we often say, also that where

there is peace and calm there can be no illness in the body, implants were placed

within the genetic composition of humankind by the Anunnaki, a warlike

civilisation determined to overtake humans by suppression

this however does not mean that souls who have not had their implants removed

or transformed are not capable of long healthy lives but they are the exception

rather than the rule, the number of souls advancing in the later ages is

staggering, here is some information to consider Michael said, and 2018 we expect

a 25 to 30 percent rise in souls on your planet who live into their 80s and 90s,

many disease-free somewhere between 2018 and 2025 50 %, michael says, of the

world's population will commonly live in their hundreds and very healthy

just imagine, Michael goes on to say I hear your collective thoughts rise now,

what about all the people living in poverty

angels surely you're not including them? what about diseases like cancer surely

you're not including these souls are you? what about chemtrails angel?

they are polluting our air our land our bodies with chemicals like aluminum

barium and lithium reports of respiratory conditions are increasing

not decreasing, what about genetically modified organisms? GMOs? are scientists

really looking for a cure to cancer and other diseases? and Michael's response is

this, the white Brotherhood of light is aware of these things and more, we, they,

you, everyone, is contributing to the eradication of these harmful effects by

working more fully with healing energies by waking up through increased awareness

by envisioning the world you wish your children to live in and taking action we

the collective of Archangels anticipate the chemtrail markings to diminish

starting in the latter half of 2018 with more movement in 2019 and 2020 the

select few who control everything on your planet

continue to crumble and fall more, news of crumbling will be learned in 2018

more advocates for healthy life and goodness will rise from all sectors of

the globe, and as far as global poverty goes we have millions of light councils

within the earth globally repairing underground tunnels and battling dark

forces there ,we are also working and winning in cosmic battles friends, do not

be manipulated into believing that the world is nothing but hatred this is what

you're being asked to think, do not be manipulated into believing that the

Illuminati will continue to thrive look what is happening recently, uncovering

pedophiles and dark worship, in addition much more light will come into fighting

large conglomerates whose main aim is greed to keep the people in poverty, in

poverty, and those in disease, to stay in disease, with the Ascension energy the

weeds will be trampled down by the footprints of love, there will be no more

cancers, there will be no more infectious diseases, no more heart disease and very

few premature deaths.

Thank you Archangel Michael, thanks everybody for listening, liking,

subscribing, and sharing my channel. expect miracles and expect a joy-filled

life, as Michael shared with me in his first book many years ago, into the white

light - the Revelations of Archangel Michael, expect the best, expect miracles,

expect a joy-filled life, these things were granted to us all the day we were

born, namaste!

For more infomation >> Archangel Michael shares how Humans will live to be up to 200 years of age! - Duration: 9:00.

-------------------------------------------

Father who lost daughter in boating accident isn't giving up on passing 'Kali's Law' - Duration: 2:10.

For more infomation >> Father who lost daughter in boating accident isn't giving up on passing 'Kali's Law' - Duration: 2:10.

-------------------------------------------

Why Pop-Up Stores Don't Work For Start Ups - Duration: 1:37.

[Brands are] thinking about the direct to consumer space,

and how we move online.

What role do you see physical retail playing in all of this?

There's the shift for all these direct to consumer brands

to create physical stores.

Why do you see that happening?

What's the reason behind that?

I think the mistake a lot of people make is opening a popup gets attention

and that's all you need.

The reality is... and what we've noticed by looking at the data

is that opening a store or a storefront is great

if people purchase more than one thing.

and the second time they purchase:

they're purchasing directly from you online.

If somebody is going in [to a pop-up], they have no loyalty.

They're buying once and they never buy again.

That popup strategy does not work.

If they're going in, if they're buying, if they like the product,

and they're like, "Oh my God.

I want to buy three more of these."

Let's say they're flats, and you wear them out,

and you love them and you want to another pair...

Or it's Denim? Or name whatever kind of case you want,

that's where that flywheel really starts to work.

That's how you can build a loyal customer base.

I think that's really the importance of it.

Customer acquisition actually is what it is.

For more infomation >> Why Pop-Up Stores Don't Work For Start Ups - Duration: 1:37.

-------------------------------------------

Nikki Bella and John Cena Break Up Again, End Beautiful and Loving 6-Year Relationship - Video - Duration: 3:03.

This Total Bellas relationship is totally over. Nikki Bella and John Cena have decided to break up for good, three and a half months after they ended their engagement

Bella, 34, explains the couple's decision in a statement to Us Weekly. After I called off the engagement, we tried to work on our relationship to get back to where it was in order to move forward with our wedding, she says

After much time and soul-searching alone, and together, we have decided to officially part ways

I had a beautiful and loving six-year relationship with a wonderful man. I have the utmost respect for John, but I know this is what's best for me

Cena, 41, proposed to Bella at Wrestlemania 33 in April 2017. After a year's worth of ups and downs, many of which were documented on her E! reality series, the couple announced their initial breakup in a statement to Us Weekly

A month beforehand, Cena told Us that relationships are hard. The prospective groom added: Don't ever think that love is easy

Love is beautiful, but we've had to come to the realization after being together for five years that love is not easy

In May, however, the couple reconciled, as Us exclusively revealed. Calling off the wedding was the right decision at the moment and their relationship only grew from it, a source said at the time

It didn't mean that any love was lost, or that they lost any feelings for one another, but they both have realized that they love each other and want to be with one another

But on Monday, July 30, reports surfaced that the wrestlers had broken up for good

If you can learn something from your experiences, good and bad, you will live with little to no regret, Cena tweeted that same day

Both Cena and Bella have been married before. He divorced Elizabeth Huberdeau in 2012 after three years of marriage, and she wed a high school sweetheart when she was 20 and divorced him when she was 23, as she revealed on Total Divas

For more infomation >> Nikki Bella and John Cena Break Up Again, End Beautiful and Loving 6-Year Relationship - Video - Duration: 3:03.

-------------------------------------------

PA Pro Tips | Ep 1: Lead Follow-up - Duration: 7:33.

Hey, everyone. I'm Lindsay with Zillow Group,

here today with a little bit of a different conversation

than you might be used to hearing from us.

This is PA Pro Tips,

where we're sharing tips from pros just like you.

Joining me is Mackinzie Ross.

She is a productivity coach with Keller Williams Group One in Reno, Nevada

Hey. Hello. How you doing?

Good. How are you?

Great. Productivity coach is a really interesting title.

What does that mean? What do you actually do?

I'm a real estate coach,

so I help agents new to the business

get into the business and get them up and going,

and get them into real estate and selling homes

and really building that awesome connection with clients.

So for somebody who is new,

or about to take the plunge into real estate,

if you could go back in time

and give some advice to your newly-minted self,

what do you think it would be?

Oh, I have three things that I live by,

and that I tell everybody:

Get comfortable being uncomfortable.

Don't fight yourself. And —

It's the sound of your voice, so get over it.

Really? Like I was always so scared to do videos,

or talk, or do whatever, because of my voice and —

Really, get over it.

I want to ask you about that make-or-break moment

when you get on the phone.

Having a conversation with somebody, and converting that

from a potential conversation into a lead —

what are your most successful strategies

when it comes to that moment?

First and foremost is always a phone call —

you have to make the phone call with somebody and let them know

that there really is a person on the other side of that line.

And the second one is, we're in a new age of technology

and, really, text messages are the way to go,

with a 98 percent open rate.

I want people to see my content, and I want people to see me.

So sometimes just sending a business card photo is really good,

and sometimes just telling them who you are,

and say, "Hey, I'm here for your — Let me help you."

When you do actually make that first phone call,

and you do connect with them, once you get off the phone,

make sure to write notes about what you talked about, 'cause we're humans,

and I can't remember what I ate for breakfast,

let alone what I just talked to somebody on the phone about two weeks ago.

I'm sure a lot of agents out there want to know,

when it comes to contacting potential clients,

how much is too much?

Is there a happy medium in there?

Probably, but I go and go and go until somebody says, "Stop."

Or always the best conversation to have is,

"How often would you like me to talk to you?

What is the best way to communicate with you?

Is it e-mail? Is it text message? Is it a phone call? Is it face-to-face?"

What is it that they want? Ask them; they'll tell you.

So I'm sure you get a curveball every now and then.

Walk me through the trickiest question

that you often get from a potential buyer on that first phone call.

I try to categorize their questions or their objections into two categories.

I try to figure out if it's an objection,

and objections are usually something that requires just a little bit more information.

And then sometimes it's somebody's opinion, and those are not curable,

or things that I have no control over or I can't fix.

One of the things I think we all get as real estate agents is,

"What are your fees?"

Or, "How do I get to the first house?

I just want to see the first house."

And you just kind of have to roll with it,

and figure out a way to get in front of them

and explain what you do as an agent,

and that you really do, as a buyer, work for free.

When it comes to information, you were talking about

how texting is kind of king for you these days.

Yep.

So now in the Premier Agent app

you can actually send and receive texts

not only through your computer, but also on your phone.

It's seamless. It's integrated.

How much has that functionality been able to help you

when it comes to reaching out to clients?

Big time. With being on the go all the time,

traveling and being out of the office,

I can't be attached to my computer all the time.

And having that option to bring it on my tablet

or on my laptop or even my phone,

and being able to text somebody

and carry all that information everywhere I go —

it's amazing.

Just a reminder, if you wanna follow along,

you can download the Premier Agent app yourself for free.

Just search Premier Agent in the app store

or on Google Play. So now you've made contact,

and you have to set out on your plan of action.

Walk me through how you coach agents

to stay one step ahead of what the client wants.

Know your market. Ask lots of questions.

Ask the client what they want. Dive deeper into their feelings

and their wants and their goals of a home.

Most of the time they will mention if they have a hobby,

or a commute to work, or children,

and those are really important things for them.

Pay attention to those, and really build their home

basis and home search off of that.

I'm sure you have had clients who ended up

in a very different house

than they initially said they wanted.

How do you navigate that?

Oh, you know, my favorite is always,

"I want a one-story," and they end up in a tri-level.

And that's okay. I try to show them each option,

one of each, so at least they have a general idea

of what each of them are, and we kind of just go from there.

And I kind of feel it out and see what they have,

and most often than not, you can kind of see what they're looking at

and really fall into arming yourself with information

that they don't know that you have.

And you can really figure out the path by just seeing what they like.

I also wanna ask you about My Agent,

which is another new feature that we have,

so that when a client logs into Zillow or Trulia,

you're the only agent that they see.

And the other interesting thing about it is,

you can actually track their activity

and see what homes they're looking at.

Yeah. My Agent is one of those things

that I never really thought was even possible,

and to have that option to send somebody an invitation to be friends,

almost, on Zillow, it really makes it easy.

You can see what they're doing, and really follow up with them,

and really arm yourself with some really good information

to make sure you're helping them in the way that they need.

And maybe they don't know what to ask,

but you know exactly what to do, because you're the professional.

And being the only agent on there that they see,

that they can reach out to and ask a question to,

and not be bombarded with phone calls

from a bunch of other agents, that's amazing.

So another feature is that you can actually see

when a client is active again. So after they've gone cold,

you can see when they're picking up that search one more time.

It's amazing to be able to have that in your back pocket,

to be able to reach out to somebody

when they've stopped talking to you.

And once they start to look at homes,

and they look at one a couple times,

that's the time to call them and say,

"Hey, I saw this amazing home,

and I thought of you when I saw it."

So now you've really gotten what that client

is looking for dialed in.

Then of course comes the upkeep, whether it's daily or weekly.

What do you coach agents on when it comes to that?

To-do lists are always one of those things

that pile up and pile up,

and you never get everything done on your to-do list.

So one of the things that I've found is notes

and your calendar. Stay on top of your notes,

and stay on top of your calendar.

Put all those next follow-ups in there,

but tasks really help with that.

Tasks will tell you when to follow up

with somebody that's 12-plus months out,

so that you're not contacting them too frequently,

and you're not letting a 30-day buyer fall through the cracks

which happens often.

I know you've been using this feature,

and it's one of the new things

that we've introduced in the PA app,

but it allows you to create a task list,

and then carry it with you

whether it's on your phone or your computer.

Because it's no help if you create a task list

and then leave it at home or in your office.

So now, using the PA app, you can actually create a task list,

carry it with you wherever you go,

and check things off when you get it done.

Yeah. And it tells you exactly

when you're supposed to follow up with somebody,

so you're never following up too frequently,

and you're really staying on top of what you're supposed to be doing.

Mackinzie, thank you so much

for sharing all of your tips with me

and with the rest of our PA community at home.

Of course.

And if you want to share your own tips

when it comes to lead conversion

and some of the things that have worked for you,

you can share those on social media

with the hashtag #PAProTips.

Thank you so much for tuning in for this episode of PA Pro Tips,

and we'll see you next time.

For more infomation >> PA Pro Tips | Ep 1: Lead Follow-up - Duration: 7:33.

-------------------------------------------

devopsdays Minneapolis 2018 - Ian Coldwater - Ship of Fools: Shoring up Kubernetes Security - Duration: 29:56.

So, my name Ian. I'm here to give a talk about Kubernetes security. I do DevSecOps at Jamf software and I focus on container security and I'm an ethical hacker.

I travel around the company playing capture the flag games, ethical hacking. I think coming from an offensive security background has made me a better defender.

Because being an attacker, teaches you a different way to think. Often developers will assume good intent. And make features for an ideal user to be used in exactly

the way that they want them to be used. And that's great. Assuming good intent is a great practice and often a good personal quality. But in fact not all users have good intentions.

And many of them might not use things in the way that they're intended. And so, a thing that's important for us to consider

is how to be able to think like an attacker in order to be able to secure things from those users.

Attackers have user stories too. As an attacker, I'm here to tell you some. As an attacker, I'm to PWN you.

So, because of the time constraints, this talk is long on high level abstractions and low on deep dives. We're barely able to scratch the surface of Kubernetes security, it's a big topic.

But if you are interested in more, I have a resources slide at the end. But before the attacker stories, let's set the stage.

In the beginning there were virtual machines. And virtual machines were very useful for people who wanted to be able to build things that require different

operating systems or different dependencies from the things that they were working on on the host.

But they came with a lot of resources and a lot of overhead. So, containers happened. They don't always contain kittens, but perhaps they should.

And containers are not tiny virtual machines. What they are is they share a kernel and have namespaces to separate them. And containers are great and very useful.

You can package all of your application and all of its dependencies, everything you need in together, but they have some problems.

They don't necessarily communicate very well on their own. They're difficult to scale in an automated way. And, you know, if you're trying to share resources like a database or anything like that,

Okay. If you're trying to share resources like a shared database in a microservice architecture, it can be a problem because they

they're stateless and they don't necessarily do that very well on their own. So, in order to solve those problems people created container orchestration frameworks like Kubernetes.

Which solved a lot of problems with being able to really scale microservice architecture and its applications in, you know, in a way that could be easily automated and done by people.

It also, as well as solving problems, added new complexity. And added like a lot of complexity. Who here thinks that Kubernetes is kind of hard? Anybody? Yeah.

I think most people who have played with Kubernetes think it's probably kind of hard. There's a really big learning curve.

There's a lot going on there, there's a lot of moving parts. And because of that, one thing that's happened is that defaults for Kubernetes make it so that security is an afterthought.

It's made to get people up and running really fast. It's made to, you know, be able to, like, smooth over the learning curve. That's cool.

But also that means that historically Kubernetes has been wide open for hackers to walk right into.

The cloud native computing foundation did a survey in 2017 that said Kubernetes was the biggest challenge security was the biggest challenge for Kubernetes users. And it that makes sense.

Because it is a challenge. There's a lot going on there. As well as Kubernetes itself being hard, all configurations have

they differ according to cloud provider, they differ according to user installation, and they differ according to whatever plugins and add ons that you're using.

And pretty much every Kubernetes cluster is going to be different. And because of that, making it like hardening

making it more secure, is going to vary really widely. And this has caused some problems. Well, Kubernetes gets hacked.

Tesla famously gets hacked. they're going to be the cautionary tale forever in every Kubernetes workshop for ever more.

Weight Watchers got hacked a few weeks ago on a server that didn't have a password at all. On open port 10250.

Which historically has been called the insecure API port. And spoiler alert, it's called the insecure API port because it was insecure.

Kubernetes 110 deprecated it. Kubernetes 110 was not that long ago. And a lot of these things still exist in the wild.

As any, you know, as anybody who has ever worked on any kind of production might know, what happens in production can sometimes stay in production.

And, you know, they're still out there for hackers to be able to get. So, security's hard. It's hard to secure it, it's hard to keep it secure, and it's easy to make mistakes.

Not only is it easy for us as developers and operations people to make mistakes, even hackers can make mistakes here. Because shit's difficult.

Besides which is kind of like DevOpsDays for the security community did a capture the flag competition a year ago, 2017.

And they left their backend wide open. So somebody who presumably had more experience with Kubernetes infrastructure than the people putting on the CTF walked right into the back of it.

Took all the flag then handed them to them and said you need to fix your API. It's not just you. We all make these mistakes.

Kubernetes has a very active community of contributors who are pushing changes very fast. And in recent versions, especially after like 1.6,

and especially in the last couple, security features have improved a lot. If you are still running 1.6, you really shouldn't be.

You should really update that. And, you know, if you can patch it, patch it. If you can update it, update it. It's really improved a lot.

That said, there's still a lot of older Kubernetes releases in prod. And they're wide open for people to discover.

How to attack those and how to defend different Kubernetes clusters varies the way you configure it. I have good news and bad news for you.

It is actually possible to secure Kubernetes clusters. The bad news is, it's not going to be secure by default.

The other bad news is, security doesn't actually end there. You have to make sure that your host, the platform it's on, your public cloud, are also secure.

So, you need to make sure that, for example, your kernel is safe from meltdown specter type attacks.

And you need to make sure that your public cloud has appropriate IAM roles applied to it. You can do this. But it'll take some work.

And you have to do this because there are bad people out there who actually do want to attack your stuff and take it. They have different motivations. But they're out there.

And they do have some things in common. Hackers don't give a shit. They don't give a shit that it's an internal system, they don't give shit about your business case.

They don't give a shit about you. That's your problem. They don't care about that. So, we water up here?

Leave that up for everybody to appreciate for a second. And different hackers do have different motivations.

Some of them might be motivated by money, some of them might be motivated by ideas, some might be motivated because they don't like you.

And your threat model is going to differ depending on what it is that you're afraid of. What is your threat model? It's important to consider it.

Are you concerned about external attackers from outside? Are you concerned about attackers specifically targeting you? Thanks.

How skilled are your adversaries? What are your capabilities in being able to protect against them? Targeted attackers are going to be more determined, possibly harder to stop.

Because they really want to get in to your system and attack you. And depending on their skill level, that can be complicated.

If you have nation states after you, you might be in deeper shit than your average fancy bear.

But if it's external attackers just looking for open ports on the Internet, a lot of the time they just want to do their thing and go.

And they're going to pick the easiest target with the lowest hanging fruit. If you aren't the easiest target with the lowest hanging fruit, they're not necessarily going to be interested.

There's a thousand other systems or million or whatever that they can come find. So, if you can be like, um, I'm not an attractive target.

That's good for you. That may be bad for me as an attacker. So, consider your threat model. What are you afraid of? What are you trying to protect?

In general Kubernetes threat model is external attackers, application or container compromise, or a compromised user or credentials.

And there's different ways to protect against all of these things. Generally speaking, regardless of her motivations,

every hacker is going to have roughly the same kind of workflow. They discover it if they're external. Or maybe they already know it's there if they're targeting you.

They are enumerating what is on that serve other what are whatever that they're looking at. What's running? What services are in there?

Are they patched? What versions are they running? Is there some vulnerable or CVE there that you can find?

And, you know, okay. So, is there anything exposed? What's running is privileged? What's connected to what?

Is there wider Internet access anywhere that I can go download some malware from and put it in there?

Are there credentials or secrets anywhere? You know, those kinds of things. Trying to figure it out. Once you figure out what's vulnerable, there is usually vulnerability.

You get the foothold, you do the hacker voice, I'm in thing. And you look around some more, if there's anything interesting in there.

If there's anything interesting you can steal. If there's anything interesting you can go. What can I do here? Anything I can loot or access?

And then you go from here and do the same thing again. Can I escalate my privileges? Can I get root? Can I get root on the host? Can I throw a crypto miner on it if?

Maybe. And see how far you can go and keep doing it as you get farther and farther. And eventually, you can't get farther anymore. But a lot of the time by then, it's already game over.

You want to make sure you're stopping hackers from being able to get from being able to get anywhere, really. But being able to get very far.

Because the farther that we are able to get, the more we're able to compromise and the less you're able to protect your own resources.

So, you know, if you have an if you're an external attacker and you're looking for things to attack, there are different ports that Kubernetes leaves open often by default that I might look for.

So, some of them could be things like the insecure API server. Or the Kubelet, which older versions of Kubelet were pretty much direct route into the container.

And to this day, depending on what cloud provider installation you're using can still be that way.

It can get around pod security policies and various other things if it is configured incorrectly.

So, I'm going to be looking for what's open. Older versions had everything in clear text in etcd. Including all passwords, database stuff, metadata for the cloud providers. I'm looking for that.

I want to go in, get what I can get. And you might think, I'm not I'm not a target. I might be too small. I might not be making, you know, like nothing in here matters.

You can't find me. You're wrong. Who here has ever heard of Shodan? Anybody? A few of you? Shodan is basically like a search engine for the Internet.

And you can go on there and search for things like open ports anywhere in the world. I did this search on Shodan last night. Because I wanted the most updated number.

As of last night this were 1975 open etcd ports on the wider Internet. A few of them I managed not to screenshot, had things like SSH keys and various other credentials.

I'm not personally interested in a CFAA case at this point in my life. I didn't go follow them. But you should know it's actually

just as easy as putting this thing in the search bar for people to find your SSH keys and other kinds of things if you're not securing them properly.

So, secure them properly. Don't leave your ports open if you don't have to. Shodan re-indexes every 24 hours. A lot of the SSH keys were several hours old.

Probably by the time I got around to seeing them other people had also seen them and gone about attacking them. It doesn't take long. So, just don't do it.

Just don't leave your stuff exposed. Make sure that if you do have anything exposed, visible, externally, that it requires authentication.

Because that's not necessarily the default. Especially with older versions of Kubernetes. Put TLS on absolutely everything. This is very important.

Because if it's cleartext, I have it. And limit SSH access to Kubernetes nodes. Because otherwise I can just wander right in there,

especially if you're doing things like leaving your SSH keys open on Shodan for all the world to see. And if you need SSH access to some of your nodes, you can create an SSH bastion

for the ones you do need. It's been said that defenders think in lists while attackers think in graphs.

And what's important to consider when thinking about securing your Kubernetes cluster is what's in your graph? This is a deceptively simple question.

Do you actually know everything that's in that cluster? Do you actually know everything that's on your public cloud act? You might not.

Especially in a big enough organization with silos or communication or process issues that can make it hard for people to know what other teams are doing.

It can be difficult or impossible to find that out. But, as an attacker, I'm determined to find that out. So, compliance might be satisfied with checking all the required boxes in the checklist.

But that isn't what I'm looking for when I'm in a network. I want to know what's in there. What's connected to what? Where I can go from here?

And for you as a defender, what you need to do is make sure that you know what microservices are communicating with each other, even within the cluster.

You need to be able to define and map out what exactly is talking to what and with which types of requests because that can allow you to define and lock down network communications.

Understand how your app operates. Understand how all of the services work together. And always remember the principle of least privilege.

The more that you limit information disclosure and things talking to one another and talking to the rest of the Internet

that don't need to be, the better shape you're going to be in and the worse shape I'm going to be in as an attacker.

So, another thing that I can do as an attacker is trying to compromise credentials or users. Computers are dumb pipes. if I have your credentials as far as the computer is concerned,

I'm probably you. So, there's a few different ways to do this. If I am trying to social engineer a developer, which developers are actually great targets

because they don't think that they're targets. They have a lot of access to things like production servers and keys and, you know, cloud metadata.

And because they don't think that they're targets, they're actually more likely to click on phishing links than marketing or sales. We should all be embarrassed about this.

So, social engineering can totally happen. If I, you know, manage to convince Joe Developer that, you know, this link is very important to click on, fantastic. I've got it.

If I can publish a helpful blog post saying, like, oh, here's this really hard thing to do with service meshes. Nobody understands the service mesh.

Like, let's be real. So, here's this really difficult thing that very few people actually know how to do. And the way that you do this is you just install my Docker image.

Kubectl create-f evilscript.yml Get my image down from Docker pull. It will walk you through the tutorial. It will be fantastic. No. Because actually it will be fantastic for me. It won't be fantastic

for you. And it's really important to not fall for social engineering. And it's really important to, like, know what your image is and what your code is doing.

Don't just throw like a YAML file into your cluster without actually knowing what it does. Actually read the code. Understand it all the way and look closely at it

because we can do things like kern our letters such that it's actually different letters or obfuscate it so that it looks fine but it isn't.

Limit access to your credentials and don't fall for any of my crap. Containers are easy to compromise. And container compromise can lead to bigger attack surfaces.

And those bigger attack surfaces can expand beyond containers and into hosts and into public clouds.

The Kubernetes control plane contains various kinds of vulnerabilities that are really important to know about.

The API server, as you can see, connects to Kube CTL, the master node and the worker node. And it if you have the API server, you have it all. And the API server historically is wide open.

The defaults are such that you can, you know, you can just wander in there. That's not necessarily the case anymore. But you need to be updating and make sure that you're

configuring your stuff correctly. etcd has all of the everything for Kubernetes in it. It has all of the things that control all of the things. And it has database information,

it has credentials, it has everything else. Historically it's plain text. If you have etcd, you have the rest of it. They are able to be controlled by Kube control.

They are able to be controlled in the cluster if you have access to open Kube control. The way that this gets prevented is by limiting communication and

movement between different parts of the cluster. So, lock your network down. Lock your cluster down. And make sure that you are only

allowing things to communicate that that should be. Really just keep it on a need to know basis. Because if you don't keep it on a need to know basis, shit can happen.

A cool thing about shared kernels is that they're also surfaces for shared kernel attacks. So, if I have meltdown or specter on one part of your container or, you know, on a container, anywhere,

then I also have meltdown or specter on the rest of the, you know, containers and the host that it's on. And if I have root in a cluster or container that's running as privileged,

ya'll, don't run your containers or your clusters as privileged. Just don't. It's a bad idea. Because the way that the entirety of the Linux file

system works is everything is based on namespaces. Everything is a file. And so, if I have access to the namespace, root in that cluster can also be root on the host.

Especially if you're mounting something on the host into the cluster which is a terrible idea. Especially if something is running privileged.

Because I can just wander into the rest of the cluster with my write access and write stuff up in there and also read it and also take it.

You can prevent container compromise in various ways. Write your own applications as securely as possible. I know it's hard. We have a lot going on. But try.

Look into resources like the OS top 10 and other kinds of secure code resources. Try to figure out how to do that well. Treat other people's code with caution.

As I said, like, you know, watch out for evil.yml files. Make sure that your dependencies and the images that you're dealing with are, you know, are actually good and not bad.

Run static code analysis on your applications and containers to check for vulnerabilities and do that periodically. Because only doing it once is just a timestamp for that moment in time.

So, if six months ago that was fine, but 24CVs have come out since that affect things in your cluster, it's probably not fine anymore. You have to keep doing that.

There are tools that are open source Clair by CoreOS is a good one. And patch or mitigate them. Immutability is a feature, not a bug, most of the time.

But if it means that every time malware knocks the container down, it comes back up with the same malware, that's not necessarily a positive thing.

Basically you want to practice defense in depth. You want to reduce your attack surface to make it so that there are as few ways for me to get in as possible.

Lockdown your networking, lockdown your secrets. You know, restrict communication. Put quotas on your resources. And just generally make it so that I'm going to have a hard time

getting in there. And if I am in there, you want to limit your blast radius. So, make sure that I can't get as far as I can so that I'm not getting into the rest of your cluster.

I'm not getting into your host, I'm not getting into your cloud account. If you can, you know, make it so that it's hard for me to get in and make it so that I can't go anywhere.

I'm going to have a lot less fun as a hacker, and you're going to have a better day as a defender. I pushed the wrong button. And that was the laser pointer.

Sorry if I pointed that at you. And follow the principle of least privilege. I said this more than once. But it's really important.

Because it makes it so that I can't escalate if I don't have it. And I want to be able to escalate, but you probably don't want me to.

There are different kinds of controls that you can use to do these things, which I have basically no time to talk about.

So, I'm putting a list of stuff here and you should take a picture of it or whatever and then Google all of them later. And look at the things on the resource slide about how to do that.

Because every single one of these is an hour long talk, at least, in and of itself. You want to, as I said, put TLS on your APIs.

imit access to those APIs, especially if they're insecure to the Kubelet, and limit control. Control what pods nodes are allowed to access. I pushed the wrong button again.

And you want to make sure that your keys are being rotated, that your secrets are being encrypted that that you are not having things that I have persistent access to.

Because if I can put a back door in your container, in your cluster, and it's just chilling there, I can keep going in there but you probably don't want that.

So, some general recommendations are, if you can upgrade to a newer Kubernetes version. I know backwards compatibility is often hard.

And in enterprise can often be complicated for other reasons, but really if you can, please do that. Especially if you're running anything 1.6 and below.

Everything by default is wide on open in 1.6 and below. Even after 1.6, even in recent versions, everything is not necessarily secure by default.

Especially with things added on to it like Helm Tiller, COPS, things that are fairly commonly used. Are wide open by default with no authorization required.

You have to put that there. If you're using those things, make sure to put them there.

Secure defaults, if you walk out with one thing here, are really, really important. Because once that default is there, once it's running in production, once people are used to it being there,

then it becomes a problem to do anything else with it. And add secure features. And then you just stay insecure.

And if you can make your defaults secure out of the box, then you don't have to worry about that kind of compatibility later.

Be careful with your secrets and your credentials where you put them. And make sure that you're logging and monitoring and paying attention to what's going on.

Observability, as we know as DevOps people, is really important. But your logging and monitoring should not actually

go inside the same cluster that I have access to because I'm just going to delete it and then you won't know that I've been there.

So, you want to make sure that those audit logs and monitoring are happening, or at least being doubled somewhere else so that you can have a more accurate record that I, as a hacker,

don't have access to. The TL;DR is basically a lot of this is really basic security advice.

It's like old school IP tables firewalls. It's what we have heard before. Defense and depth. Principle of least privilege.

The ideas of limiting your attack surface. This advice keeps being given over and over because this advice is important.

And we should all be doing it. Unfortunately we're not always doing it. Which makes things great for hackers but might make things harder for you.

So, do those things. Practice good cyber hygiene. Get your basics right. If you can make it so that it's harder for me to get in there, you are making it so that you're that much more secure

where you are. And you got this. I believe in you. You can do it. Here's my resource slide. There's a bunch of stuff on there.

And there's a lot there. The CIS benchmarks are a 276 page document. But it's worth looking into. And it's worth getting into these things in more depth

because it does take work to configure this stuff. And you can figure it out. I believe in you. And that's it.

[ Applause ]

For more infomation >> devopsdays Minneapolis 2018 - Ian Coldwater - Ship of Fools: Shoring up Kubernetes Security - Duration: 29:56.

-------------------------------------------

Cleaning Up Storm Damage - Duration: 2:00.

For more infomation >> Cleaning Up Storm Damage - Duration: 2:00.

-------------------------------------------

South Korea's intense heatwave drives up agricultural products prices - Duration: 0:31.

The wholesale price of produce is driven up due to the extreme weather.

6-point-5 percent higher than average as of late July.

Coupled with lack of rain, important crops are affected.

Napa cabbage surpassed 3,500 won, or about 3 U.S. dollars per head last month, representing

a 50-percent hike from the usual rate.

The price of radish also rose by some 66 percent, to more than a dollar 80.

The prices are expected to remain high for the time being as the heatwave is forecast

to last for at a least another month.

For more infomation >> South Korea's intense heatwave drives up agricultural products prices - Duration: 0:31.

-------------------------------------------

In The Bender Kitchen: Raquel Rivera-Pablo cooking up interesting dish with eggs and tomatillo salsa - Duration: 4:19.

For more infomation >> In The Bender Kitchen: Raquel Rivera-Pablo cooking up interesting dish with eggs and tomatillo salsa - Duration: 4:19.

-------------------------------------------

HSN | Fashion & Accessories Clearance Frenzy Up To 60% Off 08.01.2018 - 03 AM - Duration: 1:00:00.

For more infomation >> HSN | Fashion & Accessories Clearance Frenzy Up To 60% Off 08.01.2018 - 03 AM - Duration: 1:00:00.

-------------------------------------------

Fireworks Investigated After Apartment Building Goes Up In Flames - Duration: 2:44.

For more infomation >> Fireworks Investigated After Apartment Building Goes Up In Flames - Duration: 2:44.

-------------------------------------------

Do Cheat Days Work - Shape It Up (Nicole Simonin) - Duration: 3:09.

[Nicole Simonin] Do cheat days work?

Find out in today's Shape It Up video.

Hi and welcome to Shape It Up where each week I provide new videos on workouts, fitness

tips and nutrition.

Go ahead and hit that subscribe button and then you'll know when the next Shape It Up

video is out.

What constitutes as a cheat day?

Depending on who you ask, you may get different answers.

My idea of a cheat day is that there's a day where you are just eating until you feel like

you're going to vomit or eating like you're eating on Thanksgiving Day.

We tend to stuff ourselves so much that you physically cannot move.

It's a lot of food in one day.

Another way is to see how much food you can ingest in 24 hours.

Some people define cheat days as just a day where you are indulging in foods that you

are not allowed to eat.

That could also be a cheat day.

It doesn't mean that you're overeating you are just indulging in foods that you normally

don't eat throughout the week.

So what do I think about cheat days?

I really don't think they're a good idea and here's why.

When you decide to do a cheat day, all of a sudden you are in restriction mode so that

means you cannot eat certain foods throughout the week and then on this magical one day

you get to eat whatever you want.

It may work for a little bit, but long term, it is not going to work for you because you're

going to find that...say your cheat day is on Friday but you have a wedding to go to

on Saturday.

What do you do?

Do you switch the day or do you extend it from Friday to Saturday?

If you just would allow yourself to eat smaller portion sizes of the foods that you want throughout

the week, I think you're better off and mentally prepared for a lifetime of keeping the weight

off or keeping your physique the way you want it to be.

I also think having cheat days, especially if you're doing the cheat day version number

one where you're eating a ton of food and seeing how much food you can ingest in one

day, that's going to lead to binging and very disorganized eating patterns.

It's not a good path to go down and there's a lot of guilt afterwards.

After you've done your cheat day or during your cheat day, you might be on Cloud 9 because

you're eating all these foods that you're not allowed to eat and then when the day is

over you realize how much damage you've done and then the guilt kicks in.

So I really don't think cheat days are a good idea physically and mentally.

If you are in this for the long haul and you want to have lasting permanent weight loss,

you have to ditch the mentality of all-or-nothing or starvation mode and restriction.

You really need everything in moderation and just watch your portion sizes.

If you like this video please give it a thumbs up, please share it with a friend and remember

to Get Fit, Be Fierce and Have No Limits.

Stay tuned for the next Shape It Up video which will be coming out very shortly.

For more infomation >> Do Cheat Days Work - Shape It Up (Nicole Simonin) - Duration: 3:09.

-------------------------------------------

Leonsberg Clean up Paramaribo - Duration: 4:52.

A 15 minute drive from the busy center of Paramaribo you will find Leonsberg.

The place where many people come to enjoy the waterfront.

There is a pier that is the starting point of several beautiful trips,...

for example to the old coffee and sugar plantations that date from the slavery period in Suriname.

It is also a crossover for people living in New Amsterdam, the capital of the district Commewijne, ...

on the right bank of the Suriname River.

Unfortunately the area around the pier is very polluted.

On 28 July 2018 the 'Clean up Leonsberg' event was organized by the ...

Green Heritage fund Suriname and the World Wildlife Fund Suriname.

Why was Leonsberg chosen?

Many tourists come here to take a nice boat trip to spot dolphins, Braamspunt and the sea turtles.

The first impression they get is the mess here.

This is not how it should be.

So we had the idea to work with the tourism groups as well and organize a cleanup.

About 65 volunteers were struggling in the hot tropical sun to clean up the area around the pier.

Planks were used to prevent sinking into the mud.

It was not always easy.

Has the clean up action been successful?

Yes absolutely.

It is a big mix of different organizations and that is very nice .

That means that after the first two actions where we had a much smaller group.

That people now ...

are more aware about the environment and are willing to help.

Everyone wants to have a clean environment.

Today there are also small children and that's great.

A lot of plastic bottles, aluminum cans and glass bottles have been removed from the environment.

More than 400 bags of waste.

But is not mopping with the tap open?

Is there no fear that it will be dirty again tomorrow?

No, I think Surinamese don't really like a dirty country.

If you see a lot of garbage, it's hard to say I'm starting somewhere.

But if it is clean it is easier to keep clean and you do not want to be the one that makes it dirty.

Education and awareness is a very important part to get a change in behavior.

This cleanup is actually already a part of such awareness and the education.

We try as much as possible via social media, through newspapers,interviews...

to spread the message.

This year we want to do a bit more with schoolchildren and maybe even at Highschool level.

We want to organize some fun things about plastic or pollution and to let kids do it themselves.

That's where the change starts with the youth.

For more infomation >> Leonsberg Clean up Paramaribo - Duration: 4:52.

-------------------------------------------

Should investors give up on the tech sector? - Duration: 3:02.

For more infomation >> Should investors give up on the tech sector? - Duration: 3:02.

-------------------------------------------

WE ARE NOW A REVIEW CHANNEL?? - Bongani is shaking things up! Funny Plushie Videos - Duration: 4:50.

Bongani: Growler! Come in!

Growler: What do you want? I'm very busy at the moment.

Bongani: Don't talk like that to the Chairman.

Growler: Chairman? You didn't want to be the chairman

Bongani: well after some initial reluctance

Bongani: I've had some time to think and now

Bongani: I've decided to fully embrace the Chairman role and all the responsibilities that come with it

Bongani: And as part of this...

Bongani: I've had to make some drastic changes I'm afraid

Growler: Drastic changes? What do you mean?

Bongani: Well...

Bongani: We're now a review channel!

Growler: What what what what

Growler: Review channel?

Growler: But what about the comedy?

Bongani: Well the comedy wasn't working very well and um

Bongani: I've been doing some research and all of the reviews get loads of views and um

Bongani: Well we need to get more views.

Bongani: So I'm...

Bongani: We're going to do a review channel and I'm the host.

Growler: You're the host? but but

Growler: Oh! Oh I see! Now it makes sense. Of course

Growler: So you think that by starting a review channel you're going to get your face out to loads of people.

Bongani: No no no no. That's not true

Bongani: The reviews are for the best of the channel

Bongani: But if I happen to get lots of views then obviously that's a side bonus and that's great.

Growler: Oh yes yes. You tell yourself that. yes okay.

Growler: All right so if we go to a review channel

Growler: I mean it's not the worst idea in the world but but what you gonna review exactly?

Bongani: well initially I thought

Bongani: Maybe we could review my favorite types of leaves.

Growler: Leaves? That's ridiculous.

Growler: Giraffes aren't watching us it's humans

Bongani: oh but don't humans like leaves?

Growler: Not really. I mean no they prefer much other things than leaves.

Growler: I mean most people eat meat.

Bongani: Oh. Um.

Bongani: Alright I thought people like that.

Bongani: All right. If we're not doing leaves then maybe we can do like camera equipment.

Bongani: Like what about that camera over there?

Growler: Oh. The GH5. Hmm.

Growler: I mean I guess some people would probably be looking for a review on that.

Growler: It is a good camera and reasonably up-to-date

Growler: So um yeah that's not the worst idea in the world

Growler: Okay. So we're gonna review the camera. That's good.

Growler: But do you know how a review channel works? I mean um there's quite a lot of work to do you know.

Bongani: What do you mean?

Growler: Well I mean when people review cameras and things like that

Growler: They do have quite a lot of knowledge. I mean they do know what they're talking about

Growler: Or if they don't, they do some research to find out about the product.

Growler: They look at their stats, they test it and do all sorts to get the review.

Bongani: Oh no no no. We don't need that.

Bongani: I mean I'll do it but I know eveything about everything.

Growler: Oh right of course yeah obviously.

Growler: Ok but there's still quite a lot of work to do you know.

Growler: What about writing a script?

Bongani: Oh no. Well I'll write something for me to say

Bongani: But obviously I always come up with the right words.

Growler: Oh I see. Yes of course you're right.

Bongani: Yes but I do need some help though

Bongani: Because well I'm gonna be the host you see of course cuz obviously I'm so beautiful

Bongani: Yes and look at my lovely horns for example

Bongani: But I do need a director so I was thinking you could direct the shoot.

Growler: Oh I see.

Growler: Okay I guess I can do that yes I'll help you

Bongani: Oh good yes yes yes okay so

Bongani: We're gonna shoot tomorrow. Growler: All right yes yes

Growler: All right so you are going to do all of the necessary prep work right?

Bongani: Er yes of course

Growler: hmm. Yes.

Growler: I must I must admit I'm a little dubious about this because I've seen how how I guess how lazy you are at points

Bongani: Lazy? Ooh ooh. Well I'm gonna prove you wrong. Just you wait.

Growler: Okay all right all right that's fine then. If you're gonna do it then that's great.

Bongani: Ok well I'll see you tomorrow then.

Growler: Okay I'll see you tomorrow. Bye bye.

Bongani: Bye Growler.

Bongani: Hmm. Right. Er.

Bongani: I better get started on the prep work.

Bongani: Er.... Ooh it does sound like a lot of work...

Bongani: Errrrr... Hmmm....

Bongani: Nah. I'll just wing it.

For more infomation >> WE ARE NOW A REVIEW CHANNEL?? - Bongani is shaking things up! Funny Plushie Videos - Duration: 4:50.

-------------------------------------------

BLITZ BUBBLE BLOWOUT MACHINE : UNBOXING & HOW TO SET UP? | TheGarcias - Duration: 5:25.

hi welcome back to our Channel

today I'm going to show you the bubble blowout machine

today, i'm going to teach you how to operate it

okay?!

if you want to see how it work

just keep on watching

mommy will help us to open it x

we need six batteries!

we got one, two, three, four and five, and six

here's the bubble it's ahm purple bubbles, i like purple bubbles, i am so excited!

here it is guys!

this is a bubble machine

first, we have to, ahm , put the batteries

mommy is opening it right now

*giggles*, i'm so excited!

i can't wait to open it!

mommy : okay here

yehey! thank you!

now we have to put the batteries

I can't wait I can't wait I can't wait wait i can't wait, wait, wait

now we have to open this one or first we had to put bubbles liquid here inside

but be careful,

ask for help!

yehey! i'm so excited!

there's hole on it

let's press this button

what?!

mommy: wow! that's a lot! caleigh: yeah!

stop!

that's it guys!

this bubble machine is so amazing and fun I love it so much

yehey!

you can buy it in TARGET!

get one now!

thank you guys for watching! bye!

For more infomation >> BLITZ BUBBLE BLOWOUT MACHINE : UNBOXING & HOW TO SET UP? | TheGarcias - Duration: 5:25.

-------------------------------------------

Millie Bobby Brown and Jacob Sartorius Break Up After 7 Months of Dating - Duration: 1:22.

 This young love is officially over.  Stranger Things star Millie Bobby Brown and musician Jacob Sartorius have split after seven months together, they announced via their Instagram Stories on Tuesday

 The decision "was completely mutual," they said in matching statements. "We are both happy and remaining friends

"  Millie, 14, and Jacob, 15, first sparked romance rumors in October 2017, when they started flirting on social media

The teens exchanged sweet messages on Valentine's Day, and a week later, Sartorius wished Brown a happy birthday with a post declaring his love for "this beautiful girl

"  Since going public, they've posted plenty of cuddly photos together on Instagram

 Millie broke through as the kinetically gifted Eleven on Stranger Things, and Jacob gained fame singing on the defunct app Vine

Không có nhận xét nào:

Đăng nhận xét