Linux is not a secure operating system. This guide aims to explain how to harden Linux as much as possible for security and privacy.
We discuss how Python Attributes function. What is an attribute? We might say that an attribute is a variable associated with an object, but it’s more than that.
FreeBSD Jails are a well-known feature and have become core to many excellent tools on FreeBSD such as the Poudriere package builder. Jails offer process and file system isolation, but for a long time they did not offer very satisfying network isolation. VIMAGE provides isolation for networking through virtual network stacks or VNET.
A semaphore is a variable or abstract data type used to control access to a common resource by multiple processes and avoid critical section problems in a concurrent system such as a multitasking operating system.
Brush up your NumPy or learn it from scratch.
For whatever reason, this eluded me during medical school. I wanted to learn it. The concept no…
Quick Introduction The internal design of the Game Boy Advance is quite impressive for a portable console…
Since the RISC and CISC wars that raged in the late 1990s, people have claimed that RISC…
My working title for this blog post was “Why I’ll Never Fly With easyJet Again”, but that…
A team of academic researchers—who previously made the headlines earlier this year for uncovering severe security issues in…
TrueTime’s benefits for Cloud Spanner TrueTime is a highly available, distributed clock that is provided to applications…
This will be part 1 of the series where we cover Google’s Spanner system. This is the…
Amazon is on a mission to own the infrastructure of our lives. The second-largest private employer in…
Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern…
Privilege escalation vectors in Google Cloud Platform have been an interesting topic for many organizations with large…
Serverless Security AWS Lambda was released in 2014 and introduced a new cloud execution model – serverless computing,…
There’s extensive documentation on what IAM Roles are available for Google Data Catalog. But when you are getting started with…
Going to try to keep this one simple and present two items: Table with subsections such as…
We, along with the security industry and our partners, continue to investigate the extent of the Solorigate…
On Wednesday, December 16, the RedDrip Team from QiAnXin Technology released their discoveries (tweet, github) regarding the random subdomains associated…
Hydra Technologies believes in continuously investing in product quality and developer productivity by looking at recurring types…
I decided to map the entire pathway(s) of Coronavirus that currently exist in literature as of 16…
Posting for posterity; a topic I think is cool and will be addressing in a new post…
Communications at the U.S. Treasury and Commerce Departments were reportedly compromised by a supply chain attack on SolarWinds, a security vendor that…
Amazon has released support for up to 10 GB memory and 6 vCPUs for your Lambda functions….
Contents hide 1 Introduction 2 Prerequisites 3 Marking Outputs as sensitive 4 Storing State in an Encrypted…
The RISC-V ISA has pursued minimalism to a fault. There is a large emphasis on minimizing instruction…
The execution of a Python program consists of two major steps: The CPython compiler translates Python code to…
The basics of pool topology A pool is a collection of vdevs. Vdevs can be any of…
Another amazing article by Cloudflare- a gamechanger; posting for posterity and will give my thoughts when I…