Remove Applications Remove Guidelines Remove Open Source Remove Operating Systems
article thumbnail

Technology Short Take 151

Scott Lowe

The story of a developer deliberately polluting their open source projects—as outlined here for the “colors.js” Via the Kubernetes blog, Rory McCune of Aqua Security provides some guidelines for securing admission controllers. Operating Systems/Applications. ” and “faker.js”

article thumbnail

Technology Short Take 114

Scott Lowe

Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. The CNCF blog has a great article written by an Alibaba software engineer (Xingyu Chen) on some performance optimizations for etcd that have been contributed back to the open source community. Operating Systems/Applications.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Secure Your eBooks: Top ePUB DRM Solutions Unveiled

Kitaboo

It uses the.epub extension and is open-source, ensuring compatibility with various eReaders and devices. Regulatory Compliance In the digital realm, compliance with international regulatory guidelines is crucial. The Relevance of ePUB Formats ePUB means electronic publication, which is a renowned eBook format.

eBook 78
article thumbnail

Using EncFS with Dropbox and BoxCryptor

Scott Lowe

To help address that, I looked around to find an open, interoperable way of adding an extra layer of encryption onto my data. What I found is described in this post, and it involves using the open source EncFS and OSXFUSE projects along with an application from BoxCryptor to provide real-time, client-side AES-256 encryption.

article thumbnail

Technology Short Take #80

Scott Lowe

Cossack Labs recently released Acra , a database encryption suite designed to protect applications against data leaks by providing strong encryption. Acra is open source and available via GitHub. Here’s a post outlining some of VMware’s more prominent open source projects in the “cloud-native” space. and vSphere.

article thumbnail

Technology Short Take 106

Scott Lowe

I share this not to encourage illegal activities, but instead to point out that no operating system is secure, so be alert at all times and use good computing practices regardless of your OS. Non-code contributions are, in my opinion, an important but oft-overlooked aspect of open source communities. Good stuff!

article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

Technology is the application of scientific knowledge for practical purposes, especially in industry. It involves advances in computer technology, machinery, and equipment developed from the application of scientific knowledge and a branch of knowledge dealing with engineering or applied sciences. Operating System & Software Blogs.

Resources 107