1Deep Diving into Docker and Containers: What It Is and How It Works (opens in new tab)(medium.com)17Dentrax1y ago2
2Show HN: Falco-GPT: AI-generated security remediations for Falco audit events (opens in new tab)(github.com)1Dentrax2y ago0
3Show HN: I created Prometheus Exporter to monitor my xDSL Modem (OnCall enabled) (opens in new tab)(grafana.com)2Dentrax3y ago1
4Syzbot dashboard: continuously fuzzes kernel and automatically reports bugs (opens in new tab)(syzkaller.appspot.com)2Dentrax3y ago0
5KubeCon and CloudNativeCon Europe 2022 YouTube Playlist (opens in new tab)(youtube.com)4Dentrax3y ago0
6BPF ring buffer: usage scenarios, core design and program examples (2020) (opens in new tab)(arthurchiao.art)2Dentrax3y ago0
7Show HN: Cosigneth: Container Image Signing and Verifying on Ethereum [Testnet] (opens in new tab)(github.com)1Dentrax4y ago0
8Show HN: Build and push container images without Docker Daemon based on BuildKit (opens in new tab)(github.com)8Dentrax4y ago2
9Start working with container images on macOS without requiring a Docker (opens in new tab)(medium.com)4Dentrax4y ago0
10Show HN: Manage Kubernetes Admission Webhook's Certificates with Cert-Manager (opens in new tab)(medium.com)2Dentrax4y ago0
13Hardening ELF binaries using Relocation Read-Only (2019) (opens in new tab)(redhat.com)77Dentrax4y ago30
14Roles and Benefits for SBOM Across the Supply Chain (2019) [pdf] (opens in new tab)(ntia.gov)2Dentrax4y ago1
15Protect your open source project from supply chain attacks (opens in new tab)(opensource.googleblog.com)21Dentrax4y ago2