Merge pull request #2 from viniciusfdasilva/dev

Adding more certificates
This commit is contained in:
Vinicius Silva 2024-01-31 00:06:30 -03:00 committed by GitHub
commit 2476fbbb7a
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 33 additions and 3 deletions

View File

@ -167,6 +167,24 @@
<br/><br/> <br/><br/>
<center><img width="500" height="300" src="https://licap.icei.pucminas.br/img/news/artificial-intelligence-healthcare-news2-photo2.png" alt=""></center> <center><img width="500" height="300" src="https://licap.icei.pucminas.br/img/news/artificial-intelligence-healthcare-news2-photo2.png" alt=""></center>
</div> </div>
<br/><br/>
<div class="project">
<h3 class="text">Executing a DoS Attack on a Docker Container</h3>
<p style="text-align: justify; text-justify: inter-word;">Recently, I shared a publication on Medium about the importance of strengthening security in Docker environments. I discussed strategies for protecting containers against potential threats, highlighting the relevance of secure practices.
Cybersecurity is a constant priority, especially in dynamic environments like Docker containers. I believe that sharing knowledge about defenses against possible attacks is fundamental to promoting safer digital environments.
If it interests you, I invite you to read the article and share your ideas and experiences. I am always open to constructive dialogue about cybersecurity and best practices in IT.</p>
<p><a href="https://medium.com/@vinicius.silva.1046664/executando-ataque-de-dos-em-um-container-docker-1f640277d23d">link</a></p>
</div>
<br/><br/>
<div class="project">
<h3 class="text">Why are containers not implemented with chroot?</h3>
<p style="text-align: justify; text-justify: inter-word;">Discover why Docker doesn't use chroot and delve into the essence of container security and architecture with my latest article on Medium. Exploring the reasons behind this innovative choice, I unravel how Docker employs namespaces, cgroups, and other virtualization technologies to ensure a secure and highly efficient environment. Get ready for an in-depth analysis of how these techniques are shaping the future of container computing and cybersecurity. Access now and expand your knowledge of the digital infrastructure of the future.</p>
<p><a href="https://medium.com/@vinicius.silva.programmer/porque-docker-n%C3%A3o-utiliza-chroot-5f300a470e96">link</a></p>
</div>
</section> </section>

File diff suppressed because one or more lines are too long