Using Compliance to remediate CVE-2016-5195
Many of you know about or will hear about CVE-2016-5195 aka Dirty COW.
This particularly nasty kernel vulnerability has been around for years and likely affects a majority of the Linux nodes are currently running. The short form is that it allows an unprivileged user to gain root access to a system. I'm not . . .
Startups and DevOps
The following is an excerpt from a conversation I had w/ a developer who is part of a small start up. Most of the conversation was related to DevOps principals and toolchains, but after he told me about their staff of five I became worried that this was really too much. He was already worrying about CI/CD, Configuaration Management, and . . .
This post was originally published Jan 9th 2015.
So I've been using Docker for around 6 months now and I wanted to give people an idea of how easy it is to get started with. Today I'm going to show you how to get Docker running and build a simple nginx web server.
Before you begin
I'm going to be using Vagrant, for my virtual . . .
The office can be a cold, lonely, dreary, boring place. It can be hemmed in by policy and impracticality. It rarely makes sense. It's a .... ok I'll stop....
Let's kill boring, it's time to hack to the office.
Organize; Grab some Bull Clips/Binder Clips, You knowthese guys.Clip em to your desk and route your cables through . . .