-
net2pcap now implements
#seccomp filters - https://plus.google.com/114289168433047035840/posts/KStXdhcEoTM … -
Help us to graduate the
#Kubernetes features#seccomp and#apparmor to be stable, aka generally available. https://github.com/kubernetes/enhancements/pull/1444 … https://github.com/kubernetes/enhancements/pull/1148 … We need those security enhancements to be stable in Kubernetes. Let’s raise the awareness to security in k8s.
-
I just published my seminar paper on "Sandboxing With Seccomp And Seccomp-BPF" that I wrote for a
#Linux security seminar at university. Probably interesting if you want to get an overview over system call filtering techniques and#seccomp in particular. https://github.com/edermi/papers/blob/master/Seminar%20Linux%20Security%20-%20Sandboxing%20With%20Seccomp%20And%20Seccomp-BPF/paper.pdf … -
After talking a lot about how the Elasticsearch approach to security, safe & usability, I finally sat down and wrote a blog post about
#seccomp, how it is used within Elasticsearch and Beats and how you can monitor such things using auditbeat. https://twitter.com/elastic/status/1161317203934715904 … -
Scott(
@fatherlinux )will get you started with#Linux#containers on Aug 5th@devconf_in . Learn more about the container internals like#namespaces#seccomp#SELinux Registration: https://devconf.info/in/2018/registration … Workshop details https://devconfin2018.sched.com/event/F74r/linux-container-internals-lab-1-2 …pic.twitter.com/8ja79qQMcR
-
The next part of my containers blog series is now in the works

Demystifying Containers – Part IV: Container Security
Sneak peek
https://github.com/saschagrunert/demystifying-containers#part-iv-container-security- …
Featuring #seccomp,#selinux,#apparmor,#podman and for sure,#kubernetes -
thanks to
@jessfraz for contributing alpha#seccomp support to@kubernetesio! super stoked for this to be in#kubernetes 1.3 -
Hm, 64bit kernel, 32bit userspace, running 64bit userspace in container, using personality() to fake arch.
#seccomp ftw -
I wrote a blog about this years
#googlesummerofcode project with@weirdwiz_ and@rhatdan describing how we're tracing syscalls with#ebpf to generate#seccomp profiles for#containers. I'm really happy with the result and proud of our student,@weirdwiz_! https://podman.io/blogs/2019/10/15/generate-seccomp-profiles.html … -
In his final talk from the
#ContainersUnplugged series,@mkerrisk is looking underneath#Docker today. How does it make use of#namespaces,#capabilities,#cgroups and#seccomp? Interesting talk here at#jambit!pic.twitter.com/5wrgRoMrWh
-
Our writeup for
#googlectf 2018 EXECVE-SANDBOX is out! https://mhackeroni.it/archive/2018/06/29/google-ctf-2018-execve-sandbox.html …#mmap#seccomp#jailbreak -
Hey
@jessfraz did you see this#seccomp DSL posted to@lobsters?https://lobste.rs/s/euywy4/dsl_for_seccomp_rules … -
#Linux#Seccomp and#GLIBC - it's complicated. https://sourceware.org/ml/libc-alpha/2017-11/msg00316.html … -
#Seccomp can prevent malicious code from being executed within applications. In this blog post, we show you how the#ElasticStack uses seccomp to stop the execution of certain system calls & how to use Auditbeat to monitor seccomp violations in your apps. https://go.es.io/2H6mfkl -
Docker 1.10 is a “huge leap forward for container security” http://thenewstack.io/docker-engine-hardened-secure-computing-nodes-user-namespaces/ … …
@Docker#container#security#seccomp#microservices -
Seccomp Tools - Provide Powerful Tools For Seccomp Analysis http://j.mp/2z0CFWQ
#ASM#CTF#ELF#Ptrace#Ruby#Sandbox#Seccomp pic.twitter.com/rcMW03TXo0
-
New blog post: "How to secure a Go application with seccomp" https://brejoc.com/2019-11-20-how-to-secure-a-go-application-with-seccomp/ …
#golang#go#security#seccomp#programming#blog
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.