Links
AddThe OpenSSF announces the Open Source Project Security Baseline (OSPS Baseline), a new framework to help open source projects enhance security through tiered best practices. Learn more about this initiative and how it aligns with global cybersecurity regulations.
Learn how packets flow inside and outside a Kubernetes cluster. Starting from the initial web request and down to the container hosting the application
TypeSchema is a JSON specification to describe data models in a programming language neutral format.
I work from home everyday, I am susceptible to eye strain, eye pain, and dizziness. Having a working environment that’s as easy on my eyes as possible is of critical importance. I'd like to share what I've learned over the years in hopes that it can be helpful to you if you work from home, and like many, have experienced WFH eye strain.
Brendan Gregg's homepage: I use this site to share various things, mostly my work with computers, specifically, computer performance analysis and methodology.
Welcome to Navidrome! Learn More Download Your Personal Streaming Service Navidrome allows you to enjoy your music collection from anywhere, by making it available through a modern Web UI and through a wide range of third-party compatible mobile apps, for both iOS and Android devices.
🍏 + 🎯 + 🐍 = Everything you need to query Apple's FindMy network! - malmeloo/FindMy.py
Kuldeep Chowhan, Principle Engineer at Expedia, shows us how Expedia built a scalable CI/CD platform on AWS using Github, Jenkins, Amazon EC2 Container servi...
Australian businesses are paying untold amounts in ransom to hackers but the government hopes to regain some control with a landmark cybersecurity law.
In this post, I’ll show you how to build a continuous integration and continuous delivery (CI/CD) pipeline using AWS Developer Tools, as well as Aqua Security‘s open source container vulnerability scanner, Trivy. You’ll build two Docker images, one with vulnerabilities and one without, to learn the capabilities of Trivy and how to send all vulnerability […]
“Hello! I am a developer. Here is my relevant experience: I code in Hoobijag and sometimes jabbernocks and of course ABCDE++++ (but never ABCDE+/^+ are you kidding? ha!) and I like working with Shoobababoo and occasionally kleptomitrons. I’ve gotten to work for Company1 doing Shoobaboo-ing code things and that’s what led me to the Snarfus. So, let’s dive in!
Kubernetes for Prod, Tilt for Dev
The history of observability tools over the past decade has been about a pretty simple concept, but LLMs bring the death of that paradigm.
Tunneled Reverse Proxy Server with Identity and Access Control and Dashboard UI - fosrl/pangolin
For those who code
RTL-SDR brought cheap and ubiquitous Software Defined Radio (SDR) to the masses, opening up whole swaths of the RF spectrum which were simply unavailable to the average hacker previously. Because t…
Amazon Web Services (AWS) is excited to announce that a new Information Security Registered Assessors Program (IRAP) report (2023 H1) is now available through AWS Artifact. An independent Australian Signals Directorate (ASD) certified IRAP assessor completed the IRAP assessment of AWS in August 2023. The new IRAP report includes an additional six AWS services, as well as the new AWS […]
Mirror a portion of your screen to a virtual monitor for easier screen sharing. - splitbrain/clipscreen
a tiling window manager for macos. Contribute to acsandmann/rift development by creating an account on GitHub.
Explore how GitHub Advanced Security can help address several of the OWASP Top 10 vulnerabilities