Editor

Docker CheatSheet

Docker CheatSheet

Patterns for Continuous Integration with Docker on Travis CI

https://medium.com/mobileforgood/patterns-for-continuous-integration-with-docker-on-travis-ci-71857fff14c5

How To Use Docker

How To Use Docker

How To Use Docker “With Docker, developers can build any app in any language using any toolchain. “Dockerized” apps are completely portable and can run anywhere – colleagues’ OS X and Windows laptops, QA servers running Ubuntu in the cloud, and production data center VMs running Red Hat. Developers can get going quickly by starting […]

How To Install Docker step by step

How To Install Docker step by step

How To Install and Use Docker: Getting Started Introduction The docker project offers higher-level tools, working together, which are built on top of some Linux kernel features. The goal is to help developers and system administrators port applications – with all of their dependencies conjointly – and get them running across systems and machines – […]

Docker Memcached step by step

Docker Memcached step by step

Memcached on Docker Memcached is a distributed, open-source data storage engine. It was designed to store certain types of data in RAM (instead of slower rate traditional disks) for very fast retrievals by applications, cutting the amount of time it takes to process requests by reducing the number of queries performed against heavier datasets or […]

How To install and use docker – Containers getting started

Introduction The provided use cases are limitless and the need has always been there. Docker is here to offer you an efficient, speedy way to port applications across systems and machines. It is light and lean, allowing you to quickly contain applications and run them within their own secure environments (via Linux Containers: LXC). In this DigitalOcean […]

SSL interception advisory – Alert (TA17-075A)

SSL interception advisory – Alert (TA17-075A)

The Security Impact of HTTPS Interception TLS and its predecessor, Secure Sockets Layer (SSL), are important Internet protocols that encrypt communications over the Internet between the client and server, by making an identity chain using digital certificates to establish an identity chain showing that the connection is with a legitimate server verified by a trusted […]

Xperia Tablet Z2 – 23.4.A.1.232 / R5C – Root and Dual Recovery

Xperia Tablet Z2 – 23.4.A.1.232 / R5C – Root and Dual Recovery

23.4.A.1.232 / R5C CE3 now available for Sony Xperia Z2 Tablet (SGP521)   Device: Xperia Z2 Tablet (SGP521) CDA: 1282-0228 Market: CE3 Operator: Generic Network: GLOBAL-LTE Release: 23.4.A.1.232 / R5C – SuperSU 2.52 – Dual Recovery Installation 1) Use flashtool (Flashmode) to flash the ftf file on your SGP521, then unlock boot loader with flashtool […]

INFOSEK 2008

INFOSEK 2008

Leading information security event with KEVIN MITNICK – June, 9, 10 and 11, 2008 in Nova Gorica, Slovenia June 9 – Preconference Day with KEVIN MITNICK, world’s most famous (former) hacker, today’s social engineering expert. Before he was caught by the FBI he gained unauthorized access to computer systems at some of the largest corporations on the […]

Heathrow Airport Departures Hacked

Heathrow Airport Departures Hacked

kiosk in airport…one more hacked airport The Heathrow Airport of London is considered one of the most secure international airport of the world but nevertheless it has been hacked. Recently the increasing terrorist threats, that make it an high risk target, brought to make more strict the security policy in force, with very accurate check-in procedures and continuous […]