Home Search

crack - search results

If you're not happy with the results, please do another search

Faster Tied Together: Bundling Your App with webpack

In the first post of our series, we outlined three components of a modern front-end stack. In the second post, we untangled the challenge...

Which Certification is Better? CCNA or MCSE

It is really important for an IT graduate to keep up with the latest developments and advances in the technology to explore enough opportunities...

Untangling Package Management in JavaScript Applications

If a JavaScript developer was frozen in 2005 and miraculously thawed in our present world of 2017, the thing that would likely amaze them...

Linux Malware on the Rise: A Look at Recent Threats

Over the past few years, anecdotal evidence has suggested that security threats to Linux devices are on the rise. Last fall’s Mirai botnet attacks,...

Encryption Technology in Your Code Impacts Export Requirements

US export laws require companies to declare what encryption technology is used in any software to be exported. The use of open source makes...

​How to Use Linux’s Built-In USB Attack Protection

There are USB sticks that will destroy your computer, USB sticks loaded with spyware, and even official enterprise USB sticks infected with malware. Last, but never...

9 Shell Tips Every Developer Should Know

The shell is your friend. But many developers don’t really know the shell, the Unix or Linux command-line environment available in several operating systems....

Containers Running Containers with LinuxKit

Some genuinely exciting news piqued my interest at this year’s DockerCon, that being the new operating system (OS) LinuxKit, which was announced and is immediately...

Avoid Using Lazy, Privileged Docker Containers

It's probably a little unfair to call everyone who uses privileged containers "lazy" but, from what I've seen, some (even security) vendors deserve to be labeled as...

Configure And Use Linux-PAM

In a previous post, we talked about Linux iptables firewall, and some people asked about authentication. Today we will talk about the powerful framework...