Remove Comparison Remove Construction Remove Linux Remove Operating Systems
article thumbnail

Technology Short Take 138

Scott Lowe

Here’s Chip Zoller’s comparison of Gatekeper and Kyverno. Operating Systems/Applications. Via TecMint, James Kiarie explains how to use VirtualBox VMs on KVM in Linux. As always, I welcome all constructive feedback and I love hearing from readers, so feel free to reach out to me on Twitter.

IPv6 60
article thumbnail

Technology Short Take 131

Scott Lowe

Here’s a review of targeted attacks and APTs (advanced persistent threats) on Linux. The article doesn’t go deep on any of them, but does provide some useful information and comparison of the various mechanisms. Operating Systems/Applications. More details are found in this article. —isn’t perfect.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #50

Scott Lowe

Kevin Houston’s March 2015 blade server comparisons might be a useful place to start. It’s important to note that these security enhancements don’t really represent “net new” functionality but rather reflect existing Linux security constructs now being exposed and usable by Docker. Operating Systems/Applications.

Vmware 60
article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

Vamosi: So a vulnerable version of Bash provided an attacker the ability to pass untrusted code to other systems and processes. It’s like the operating system left the front door wide open to attackers. One of the more important features of any operating system is its shell. How did this happen?

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

Vamosi: So a vulnerable version of Bash provided an attacker the ability to pass untrusted code to other systems and processes. It’s like the operating system left the front door wide open to attackers. One of the more important features of any operating system is its shell. How did this happen?