What's Docker Security?
Let's investigate swiftly what security really means when we look at the container stack: client tooling, docker host, docker images and the application running on it.
This can be used as a reference when hardening your Docker ecosystem.
This was initially written for the Docker Meetup at 19/03/2019 Antwerp.
What's Docker Security?
Let's investigate swiftly what security really means when we look at the container stack: client tooling, docker host, docker images and the application running on it.
This can be used as a reference when hardening your Docker ecosystem.
This was initially written for the Docker Meetup at 19/03/2019 Antwerp.
Tutorial on Ubuntu on the occasion of Ubuntu 18.04 Release Party. Organised by Mahatma Gandhi University Library and Kerala Library Association-Kottayam Region.
Building Mini Embedded Linux System for X86 ArchSherif Mousa
Full tutorial to learn how to build your own embedded Linux system as a MiniOS for your X86 device (PC ...).
It's considered a good start for anyone to get into the field of Embedded Linux building and development.
Introduction to Linux OS, Linux file system hierarchy, Linux commands, Files permissions, Input-Output redirection, Environment variables, Process management, Linux shell scripting.
LInux: Basics & File System:The Unix operating system was conceived and implemented in 1969 at AT&T's Bell Laboratories in the United States by Ken Thompson, Dennis Ritchie, Douglas McIlroy, and Joe Ossanna. First released in 1971, Unix was written entirely in assembly language, as was common practice at the time. Later, in a key pioneering approach in 1973, it was rewritten in the C programming language by Dennis Ritchie (with exceptions to the kernel and I/O). The availability of a high-level language implementation of Unix made its porting to different computer platforms easier.
A beginners guide to get familiar with the Linux and learn the most commonly and frequently used commands. Most of the commands are expected to run across all well known Linux distributions. Plus, there are a few commands for the advanced users as well.
Tutorial on Ubuntu on the occasion of Ubuntu 18.04 Release Party. Organised by Mahatma Gandhi University Library and Kerala Library Association-Kottayam Region.
Building Mini Embedded Linux System for X86 ArchSherif Mousa
Full tutorial to learn how to build your own embedded Linux system as a MiniOS for your X86 device (PC ...).
It's considered a good start for anyone to get into the field of Embedded Linux building and development.
Introduction to Linux OS, Linux file system hierarchy, Linux commands, Files permissions, Input-Output redirection, Environment variables, Process management, Linux shell scripting.
LInux: Basics & File System:The Unix operating system was conceived and implemented in 1969 at AT&T's Bell Laboratories in the United States by Ken Thompson, Dennis Ritchie, Douglas McIlroy, and Joe Ossanna. First released in 1971, Unix was written entirely in assembly language, as was common practice at the time. Later, in a key pioneering approach in 1973, it was rewritten in the C programming language by Dennis Ritchie (with exceptions to the kernel and I/O). The availability of a high-level language implementation of Unix made its porting to different computer platforms easier.
A beginners guide to get familiar with the Linux and learn the most commonly and frequently used commands. Most of the commands are expected to run across all well known Linux distributions. Plus, there are a few commands for the advanced users as well.
De wereld is vol van verandering. En de consument verandert, niet in de laatste plaats vanwege technologische ontwikkelingen, in een grillig tempo mee. Waar staan we? Waar gaan we naartoe? Welke ontwikkelingen kunnen we nog verwachten? Als spreker tijdens een bijeenkomst van het Installatie Marketing Platform ging ik in op het thema 'Online Marketing anno 2016'.
Ben je zelf op zoek naar een spreker voor jouw event?
Neem dan contact met me op via wieger@xpertmarketing.nl of kijk voor meer info op http://wie.gr/spreekt/
Presentation: Bright Shiny Alternatives: Instagram
In the first of two presentations about social platforms being overlooked by some brands, we take a close up look at Instagram. Presenter Michoel Ogince thinks your brand should be on it! Engagement on Instagram is 15x that of Facebook and a recent report considers the photo app the best media acquisition of the last five years. This session will explore the powerful emotional connection that Instagram establishes between brand and consumer, as well as best practices and social ROI.
SubmitJS: Developing desktop applications with Electron. Mykyta SemenistyiBinary Studio
See full record of the tals from our javascript meetup here: https://www.youtube.com/watch?v=QcSYGj4dZHo&index=4&list=PLXsWM8PhzhwRoD91MzCWn-INKkgoJBXxV
"Playing in the Sandbox: Adobe Flash Exploitation Tales" - Björn RuytenbergPROIDEA
Sandboxing is a popular technique used by vendors to minimize damage that applications might cause to a system. Dictated by so-called sandbox policies, legitimate and malicious code alike are restricted in their trust boundaries. Input validation is key to enforcing sandbox policies. With input validation, context often matters: given some policy, certain input may be allowed, while the same input may be invalid given another. File paths are a prime example. In Adobe Flash Player, the ""remote"" sandbox prohibits local file system access but enables remote connections, while the ""local-with-filesystem"" sandbox enables the opposite use case. While being a seemingly simple concept, validating file paths becomes increasingly complicated when considering the entire picture. With Flash being the intermediate glue between operating systems and various host environments - web browsers, Microsoft Office, PDF readers - there is a diverse landscape of path schemes to consider. This leads to challenges in path validation, and as it turns out, subtle but unforgiving mistakes. This talk analyzes two sandbox escape vulnerabilities I have recently found in Adobe Flash. The first vulnerability details a local sandbox escape through bypassing path validation, enabling to exfiltrate local data, obtain Windows user credentials, and escalate privileges. The second vulnerability is a patch break in the remote sandbox, showing that Adobe's mitigations for the first vulnerability incompletely solved the issue. Both vulnerabilities have resulted in significant changes to Adobe Flash's sandbox design, forcing web developers to refactor their applications. In analyzing these vulnerabilities, we'll review the underlying causes that made them possible: ambiguous RFC specifications, arbitrary definitions of what constitutes ""remote"" and ""local"", inadequate path validation schemes, and OS-specific vulnerabilities. Finally, in light of recent efforts to deprecate Adobe Flash, we'll also discuss how Flash will remain important in the short and long term. What are the industry's efforts to minimize its attack surface? What gaps do these efforts leave for future exploitation? And finally, will end users still be vulnerable until 2020?"
Presented by: Elizabeth Joseph, IBM
Presented at All Things Open 2020
Abstract: Many enterprises and, as many of us learned during the COVID-19 outbreak, governments, rely on mainframes to do the bulk of their data-driven work and the modern mainframe is very good at what it does. But what if you’re looking to modernize your platform and bring in the DevOps methodologies, tooling, and practice into your organization?
Today, there is an entire product line of mainframes that exclusively run Linux (RHEL, SLES, or Ubuntu). With Linux, you get access to the vast ecosystem of open source software that’s already been ported to the mainframe architecture (s390x), with more being ported every month.
If your organization is using z/OS, the Open Mainframe Project has a series of open source projects targeted specifically at the mainframe and improving usability. Zowe, for instance, helps create a consolidated API for accessing resources and workload on your system and Feilong is a z/VM connector that allows you to manage your virtual machines with familiar open source tooling like OpenStack. There are even connectors for Jenkins that allow you to integrate CI/CD pipelines with your workloads.
In this talk I’ll explore all of this in more to show you how an automated, modern environment can thrive on today’s mainframe.
Windows Server and Fast CGI Technologies For PHPTim Keller
PHP is a wildly popular scripting language for the web, and powers some of the largest websites on the Internet. Traditionally, PHP on Windows has been something of an oxymoron.
Join us and find out why PHP is now highly performant, scalable and efficient when run under FastCGI on Windows Server and IIS. Presented by a local PHP developer, you'll gain insight into how you can take advantage of PHP on Windows, and integrate it with technologies like PowerShell, ASP.NET and SQLServer.
Originally presented at Microsoft TechEd Africa 2009 (August 3, 2009)
Presentation given at FITC Amsterdam 2012.
AIR has been the cross device platform to deploy interactive applications. This session shows you how you can extend the default capabilities and add native interaction and performance to your applications.