Links
AddLinux can send a notification every time a file is added to a directory. Here's how to use that for automation.
Are we doomed to die out? We find ourselves at the only point in the history of the species when the rate of population...
In this article, you will find a list of open source cybersecurity tools that you'll wish you'd known earlier.
August 31, 2021: AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info. In this post, I demonstrate a sample workflow for generating a digital signature within AWS […]
operational pgp - draft. GitHub Gist: instantly share code, notes, and snippets.
Unimog is the Layer 4 Load Balancer for Cloudflare’s edge data centers. This post explains the problems it solves and how it works.
This may be overkill, but it works on my machine
Claude can now discover, learn, and execute tools dynamically to enable agents that take action in the real world. Here’s how.
Secure and fast microVMs for serverless computing. - firecracker-microvm/firecracker
Luxury Yacht - Sail the seas of Kubernetes in style! - luxury-yacht/app
Lenticular Clock: After making my Moire Clock a got interested in a very similar effect: lenticular animations. You probably have seen this effect before, e.g. on post cards. I remember having a ruler in primary school with a picture of dinosaurs on it that changed d…
Read how Google is using System Theoretic Process Analysis (STPA) to analyze pure software systems and discover risks.
September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. Today, AWS introduced AWS IAM Identity Center (AWS IAM Identity Center), a service that makes it easy for you to centrally manage IAM Identity […]
Enterprise software giant Red Hat is now being extorted by the ShinyHunters gang, with samples of stolen customer engagement reports (CERs) leaked on their data leak site.
Because the Active Directory security lies in the process and not in expensive tools, our solution is simple: download PingCastle and apply its methodology.