Adding more certificates
This commit is contained in:
parent
9511b0b920
commit
d6327044a9
18
blog.html
18
blog.html
|
|
@ -167,6 +167,24 @@
|
||||||
<br/><br/>
|
<br/><br/>
|
||||||
<center><img width="500" height="300" src="https://licap.icei.pucminas.br/img/news/artificial-intelligence-healthcare-news2-photo2.png" alt=""></center>
|
<center><img width="500" height="300" src="https://licap.icei.pucminas.br/img/news/artificial-intelligence-healthcare-news2-photo2.png" alt=""></center>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
<br/><br/>
|
||||||
|
<div class="project">
|
||||||
|
<h3 class="text">Executing a DoS Attack on a Docker Container</h3>
|
||||||
|
<p style="text-align: justify; text-justify: inter-word;">Recently, I shared a publication on Medium about the importance of strengthening security in Docker environments. I discussed strategies for protecting containers against potential threats, highlighting the relevance of secure practices.
|
||||||
|
Cybersecurity is a constant priority, especially in dynamic environments like Docker containers. I believe that sharing knowledge about defenses against possible attacks is fundamental to promoting safer digital environments.
|
||||||
|
If it interests you, I invite you to read the article and share your ideas and experiences. I am always open to constructive dialogue about cybersecurity and best practices in IT.</p>
|
||||||
|
|
||||||
|
<p><a href="https://medium.com/@vinicius.silva.1046664/executando-ataque-de-dos-em-um-container-docker-1f640277d23d">link</a></p>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<br/><br/>
|
||||||
|
<div class="project">
|
||||||
|
<h3 class="text">Why are containers not implemented with chroot?</h3>
|
||||||
|
<p style="text-align: justify; text-justify: inter-word;">Discover why Docker doesn't use chroot and delve into the essence of container security and architecture with my latest article on Medium. Exploring the reasons behind this innovative choice, I unravel how Docker employs namespaces, cgroups, and other virtualization technologies to ensure a secure and highly efficient environment. Get ready for an in-depth analysis of how these techniques are shaping the future of container computing and cybersecurity. Access now and expand your knowledge of the digital infrastructure of the future.</p>
|
||||||
|
|
||||||
|
<p><a href="https://medium.com/@vinicius.silva.programmer/porque-docker-n%C3%A3o-utiliza-chroot-5f300a470e96">link</a></p>
|
||||||
|
</div>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
|
||||||
|
|
|
||||||
File diff suppressed because one or more lines are too long
Loading…
Reference in New Issue