<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>containers</title>
    <link rel="self" type="application/atom+xml" href="https://links.pgmac.net.au/guest/tags/113/feed"/>
    <updated>2026-05-07T00:07:27+10:00</updated>
    <id>https://links.pgmac.net.au/guest/tags/113/feed</id>
            <entry>
            <id>https://links.pgmac.net.au/links/798</id>
            <title type="text"><![CDATA[subtrace/subtrace]]></title>
            <link rel="alternate" href="https://github.com/subtrace/subtrace" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/798"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Wireshark for Docker containers. Contribute to subtrace/subtrace development by creating an account on GitHub.]]>
            </summary>
            <updated>2025-05-28T00:55:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/725</id>
            <title type="text"><![CDATA[FreeBSD 14.2 wants to woo Docker fans but still struggles with Wi-Fi]]></title>
            <link rel="alternate" href="https://www.theregister.com/2024/12/05/freebsd_142/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/725"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Another buzzword box ticked: OCI-compliant containers]]>
            </summary>
            <updated>2026-01-24T10:00:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/691</id>
            <title type="text"><![CDATA[firecracker-microvm/firecracker]]></title>
            <link rel="alternate" href="https://github.com/firecracker-microvm/firecracker" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/691"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secure and fast microVMs for serverless computing. - firecracker-microvm/firecracker]]>
            </summary>
            <updated>2026-01-23T04:00:29+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/420</id>
            <title type="text"><![CDATA[aurae-runtime/aurae: Distributed systems runtime daemon written in Rust.]]></title>
            <link rel="alternate" href="https://github.com/aurae-runtime/aurae" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/420"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Distributed systems runtime daemon written in Rust. - aurae-runtime/aurae]]>
            </summary>
            <updated>2026-01-26T06:00:41+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/389</id>
            <title type="text"><![CDATA[Container security best practices: Ultimate guide - Sysdig]]></title>
            <link rel="alternate" href="https://sysdig.com/blog/container-security-best-practices/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/389"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Sticking to container security best practices is critical for successfully delivering secure software.]]>
            </summary>
            <updated>2026-01-23T06:00:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/317</id>
            <title type="text"><![CDATA[How to build a CI/CD pipeline for container vulnerability scanning with Tri]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-build-ci-cd-pipeline-container-vulnerability-scanning-trivy-and-aws-security-hub/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/317"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[In this post, I’ll show you how to build a continuous integration and continuous delivery (CI/CD) pipeline using AWS Developer Tools, as well as Aqua Security‘s open source container vulnerability scanner, Trivy. You’ll build two Docker images, one with vulnerabilities and one without, to learn the capabilities of Trivy and how to send all vulnerability […]]]>
            </summary>
            <updated>2026-01-19T06:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/209</id>
            <title type="text"><![CDATA[Dive: A tool for exploring a Docker image layer contents and more]]></title>
            <link rel="alternate" href="https://github.com/wagoodman/dive" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/209"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A tool for exploring each layer in a docker image. Contribute to wagoodman/dive development by creating an account on GitHub.]]>
            </summary>
            <updated>2025-12-24T14:00:12+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/129</id>
            <title type="text"><![CDATA[netstat without netstat · Staaldraad]]></title>
            <link rel="alternate" href="https://staaldraad.github.io/2017/12/20/netstat-without-netstat/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/129"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.]]>
            </summary>
            <updated>2026-03-18T06:00:27+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/90</id>
            <title type="text"><![CDATA[Docker Training - Docker Training]]></title>
            <link rel="alternate" href="https://training.docker.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/90"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-05-04T06:00:25+10:00</updated>
        </entry>
    </feed>
