Articles

Small but Deadly  

The Flipper Zero mobile hacking tool, a highly portable device that looks like a kiddy toy at first glance, can check a wide range of wireless connections for vulnerabilities. We take a look at potential applications in pentesting scenarios.

Behind the Mask  

Data anonymization and pseudonymization are two key techniques that ensure privacy while enabling the use of data for analysis and decision making; the two methods offer different approaches that vary as a function of use case.

Doing Without  

Use advanced techniques for automation, optimization, and security to deploy serverless applications with the OpenFaaS framework in a Linux environment.

Eruption  

Volcano optimizes high-performance workloads on Kubernetes to avoid deadlocks.

Light at the End of the Tunnel  

We give you the ultimate guide to deploying a self-hosted Pritunl VPN server with multifactor authentication.

Contained  

Podman has become an attractive alternative to Docker, not least because it does not require a central daemon. In this article, we look at how to set about changing the guard and how you can use Podman Desktop to do so.

Production Line  

The bootc project lets you use a container-based workflow to create bootable operating system images. In a few simple steps, we show you how to use Podman to create ready-to-run images.

Tracker  

This traffic analysis software identifies malicious traffic on your network with the use of established sources.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.