VMs vs. Containers for Microservices
▻https://hackernoon.com/vms-vs-containers-for-microservices-a6f559970704?source=rss----3a8144eab
What makes more sense for an enterprise?In my previous blog, I talked about how enterprises can achieve continuous delivery of applications using microservices and containers. Here, I delve deeper to compare containers and VMs from a microservices architecture viewpoint.In this software era of constant evolution, we hear a lot of talk about using containers for microservices and the need to modernize monolithic applications. But, there is always an impending question for an enterprise that arises next and is rarely addressed — Why not use VMs instead of containers?Virtual Machines offer virtualization of hardware as well as the OS and create an efficient, isolated duplicate of a real machine. In the case of containers, only the OS is virtualized and not the hardware, creating a (...)
#application-delivery #enterprise-application #microservice-architecture #app-deployment #docker
]]>#google releases 10 new and updated enterprise focused security tools and services
▻https://hackernoon.com/google-releases-10-new-and-updated-enterprise-focused-security-tools-and
In March, Google announced more than 20 security enhancements, deciding that apparently, that number wasn’t enough today they are announcing:Context-aware access capabilities, available now for select customers in beta for VPC Service Controls, and coming soon to beta for Cloud IAM, Cloud IAP and Cloud IdentityTitan Security Key, available now to Cloud customers, and coming soon to the Google StoreShielded VMs, available now in betaBinary Authorization, coming soon to betaContainer Registry Vulnerability Scanning, coming soon to betaCloud Armor geo-based access control, available now in betaCloud HSM, coming soon to betaAccess Transparency, soon to be generally availableG Suite security center investigation tool, available now via Early Adopter ProgramG Suite data regions, now generally (...)
]]>Scaling Effectively: when #kubernetes met Celery
▻https://hackernoon.com/https-medium-com-talperetz24-scaling-effectively-when-kubernetes-met-cel
This is a story about software architecture, about a personal itch, and about scalability. And like any good tech story, it begins with a shaky architecture.At Panorays, we help large enterprises to measure the security posture of their suppliers. But I’m not going to get into the whole 3rd party security management extravaganza with you. we came to talk about our architecture and process.In the beginning, there was bash. and scripts to manage VMs. a lot of scripts.There was a VM instance for each company we assessed.Every VM executed sequential batch jobs that imitate the whole reconnaissance phase of the hacker’s lifecycle.Company level parallelism is achieved by firing up more VMs.We built an internal orchestration system via Cron & Bash (imagine how fun was that…).Problems:The (...)
]]>Indonesia Turns to Google in War on Illegal Fishing – gCaptain
▻http://gcaptain.com/indonesia-turns-to-google-in-war-on-illegal-fishing
But it’s not game over for the minister: she says local boats are still working with “global pirates” who catch fish just outside the permitted zone, which are then shipped to foreign destinations. And that’s where Google comes in.
“They still steal from us. We see it on Google fishing watch,” [Indonesia’s Fisheries Minister Susi] Pudjiastuti said, referring to Global Fishing Watch, an online mapping platform co-founded by Google. “They use Indonesian-affiliated companies and businesses and basically take their catch a few miles beyond the exclusive economic zone, where a refrigerated mothership is waiting.”
Indonesia last year became the first nation to share its Vessel Monitoring System information — government-owned data used to monitor maritime traffic — with the global monitoring platform, founded by Google, Oceana and SkyTruth, and funded by partners including the Leonardo DiCaprio Foundation and Bloomberg Philanthropies.
Pudjiastuti’s initiative instantly made nearly 5,000 previously invisible boats viewable. She has called for other nations to follow her lead, with Peru last year committing to making its fishing data available.
Brian Sullivan, the manager of Google Ocean and Earth Outreach, said information from Indonesia’s VMS was fed through the same algorithm used by Global Fishing Watch to produce a new set of analytics. That was then added to raw satellite imagery to produce an even more detailed footprint of fishing activities in near-real time.
“Susi reached out to us and said ’I like what you’re working on, we’d like to see how we could use that information in Indonesia,” California-based Sullivan said in a telephone interview. “She has been probably one of the most progressive ministers within fisheries for taking something that historically all governments had kept extremely close.”
By using machine learning and watching how a vessel moves, Google’s technology is able to establish patterns, and determine whether a vessel is in transit or fishing.
A study published last month found that foreign fishing in Indonesia dropped by more than 90 percent and total fishing by 25 percent following the tough policies introduced by Pudjiastuti, which also included a ban on all foreign-owned and -made boats from fishing in Indonesia and the restriction of transfers of fish at sea.
“We know what it looks like when a vessel is broadcasting because we see that vessel’s position,” said Sullivan. “And if it then goes quiet for a while and then reappears on the other side of a marine-protected area that would be considered suspicious activity.”
]]>Chrome OS will soon let you run Linux VMs
▻https://www.omgubuntu.co.uk/2018/02/google-enable-linux-apps-chrome-os-recent-code-commits-suggest
It could soon be possible to run Linux apps on a Chromebook without jumping through hoops. Recent commits to the Chrome OS source code suggests that Google is preparing to introduce support for virtual machines, specifically Linux containers. Such a feature would unlock a stack of possibilities for developers and for Chrome OS — but […] This post, Chrome OS will soon let you run Linux VMs, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.
]]>Lynx Users Guide v2.7
▻http://www.neurophys.wisc.edu/comp/lynx_users_guide.html
Bonus gratuit : Avec Lynx on est à totalement l’abri des scripts nocifs sur les pages web, enfin prèsque.
Lynx a un seul inconvénient : les pages qui ne marchent qu’àvec #javascript restent inaccessibles - mais ne faites pas confiance au message d’erreur qui s’affiche quand vous éteignez JS dans votre brouteur habituel ; assez souvent Lynx affiche joliment des pages web qui exigent du JS dans Chrome, Firefox et d’autres systèmes plus « modernes ».
Lynx is a fully-featured World Wide Web (WWW) client for users running cursor-addressable, character-cell display devices (e.g., vt100 terminals, vt100 emulators running on PCs or Macs, or any other character-cell display). It will display Hypertext Markup Language (HTML) documents containing links to files on the local system, as well as files on remote systems running http, gopher, ftp, wais, nntp, finger, or cso/ph/qi servers, and services accessible via logins to telnet, tn3270 or rlogin accounts (see URL Schemes Supported by Lynx). Current versions of Lynx run on Unix and VMS.
Lynx can be used to access information on the WWW, or to build information systems intended primarily for local access. For example, Lynx has been used to build several Campus Wide Information Systems (CWIS). In addition, Lynx can be used to build systems isolated within a single LAN.
Pour le #mail c’est pareil, je redécouvre #Mutt qui est très puissant aussi.
The Mutt E-Mail Client
▻http://www.mutt.org
“All mail clients suck. This one just sucks less.” -me, circa 1995
web browser - Using Lynx on potentially malicious websites - Information Security Stack Exchange
▻https://security.stackexchange.com/questions/97873/using-lynx-on-potentially-malicious-websites
in theory, you are still vulnerable. Even in Lynx there are still components that parse HTML, interact with the network, keep track of cookies, etc (tip: use curl or wget to just download the page without even parsing it to be even more careful). That is still quite a big attack surface, though I would consider it safe enough at this point. Maybe not safe enough against a targeted attack from a powerful attacker, but definitely safe enough for random Android websites.
Deluge of Browser Security Issues Drives Mass Migration | Netcraft
▻https://news.netcraft.com/archives/2009/04/01/deluge_of_browser_security_issues_drives_mass_migration.html
April Erste, Public Relations Manager at the First National Bank of Oki Koki, told Netcraft that users are migrating to Lynx because of its speed and advanced security features. She added: “Lynx has not once suffered a buffer overflow in its image processing, and indeed has suffered no security vulnerabilities at all in the last 2 years.” By comparison, the most recent Firefox security update was only 4 days ago.
The bank also notes that Telnet remains popular with a small group of its customers. Although it lacks the sophisticated user interface of Lynx, many security experts argue that Telnet is significantly more secure and has the largest installed base of any browser.
Erste said that while the bank is dedicated to providing an accessible online banking experience, some customers still report difficulties when trying to make HTTPS requests through Telnet without the aid of an extended keyboard layout.
Lynx Information
▻http://lynx.browser.org
Many user questions are answered in the online help provided with Lynx. Press the ’?’ key to find this help.
LYNX – The Text Web-Browser
▻http://lynx.invisible-island.net
This is the toplevel page for the Lynx software distribution site.
The current development sources have the latest version of Lynx available (development towards 2.8.9).
The main help page for lynx-current is online; the current User Guide is part of the online documentation.
The most recent stable release is lynx2.8.8.
P.S. Lynx marche très bien sous Windows ;-)
]]>Ten sailors missing after U.S. warship, tanker collide near Singapore
▻https://www.reuters.com/article/us-usa-navy-crash-idUSKCN1B100C
ça devient une habitude…
mais cette fois à babord, donc, a priori, c’est lui qui a priorité…
Ten sailors are missing after a U.S. warship collided with an oil tanker east of Singapore before dawn on Monday, tearing a hole beneath the waterline and flooding compartments that include a crew sleeping area, the U.S. Navy said.
The collision between the guided-missile destroyer USS John S. McCain and the tanker Alnic MC was the second involving U.S. Navy destroyers and merchant vessels in Asian waters in little more than two months.
The ships collided while the U.S. warship was heading to Singapore for a routine port call, the Navy said in a statement.
]]>Ubuntu 18.04 To Ship with GNOME Desktop, Not Unity
▻http://www.omgubuntu.co.uk/2017/04/ubuntu-18-04-ship-gnome-desktop-not-unity
Ubuntu 18.04 LTS will use GNOME as its default desktop environment, not Unity. In an extraordinary blog post that I have yet to fully digest, Mark Shuttleworth has announced that Canonical is to end its investment in Unity 8, Ubuntu for Phones and tablets, and end its ambition to seek “convergence”. “I’m writing to let […] This post, Ubuntu 18.04 To Ship with GNOME Desktop, Not Unity, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.
]]>xdissent/ievms - GitHub
►https://github.com/xdissent/ievms
The ievms scripts aim to facilitate that process using VirtualBox on Linux or OS X. With a single command, you can have IE7, IE8 and IE9 running in separate virtual machines.
]]>