Remove Applications Remove Comparison Remove Construction Remove Linux
article thumbnail

Technology Short Take 131

Scott Lowe

This time around the content is a tad heavy on the security side, but I’ve still managed to pull in articles on networking, cloud computing, applications, and some programming-related content. Here’s a review of targeted attacks and APTs (advanced persistent threats) on Linux. Operating Systems/Applications.

Linux 60
article thumbnail

Technology Short Take 138

Scott Lowe

Here’s Chip Zoller’s comparison of Gatekeper and Kyverno. Operating Systems/Applications. Via TecMint, James Kiarie explains how to use VirtualBox VMs on KVM in Linux. As always, I welcome all constructive feedback and I love hearing from readers, so feel free to reach out to me on Twitter. Virtualization.

IPv6 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #50

Scott Lowe

Kevin Houston’s March 2015 blade server comparisons might be a useful place to start. It’s important to note that these security enhancements don’t really represent “net new” functionality but rather reflect existing Linux security constructs now being exposed and usable by Docker. Operating Systems/Applications.

Vmware 60
article thumbnail

Thinking Out Loud: The Future of Kubernetes

Scott Lowe

Kubernetes seems focused on addressing the needs of container-based microservices-centric application architectures. However, there now seem to be some efforts to push Kubernetes to support other types of applications as well. Are there use cases where these constructs are useful? Yes, certainly. I’m not so sure.

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

In a subsequent academic paper, Miller demonstrated that 25-33% of the Unix applications tested with fuzz either crashed or hung when reading random Input. used vulnerabilities in sendmail and the fingerd protocol to construct unintentionally what would become the first internet worm. What’s a worm?

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

In a subsequent academic paper, Miller demonstrated that 25-33% of the Unix applications tested with fuzz either crashed or hung when reading random Input. used vulnerabilities in sendmail and the fingerd protocol to construct unintentionally what would become the first internet worm. What’s a worm?