Crossroads of cybersecurity, philosophy and innovation. Read on for best security practices, how to's, tutorials and sensational tales of hacking
Learning new things or building new things requires rapid prototyping. This is a guide on how to create a VM template using a raw image and LVM-Thin...
I had a weird notion that proxmox was throttling the network throughput of guests, however today I discovered that it was only due to the CPU of the...
A gentle introduction to userspace instrumentation · Before we start, I want to highlight the difference between bpftrace and eBPF programs. eBPF...
In this blog, we will continue with tracing. We'll aim to get a basic understanding of: How processes work Exit codes Forking of processes Exit...
Enter God mode · Welcome, this is the first in a series of articles that I will be writing about the eBPF - in my quest to educate myself, and...
I'm looking at you, Azure. · Network traffic monitoring is essential for large-scale networks and organizations to actively detect and prevent intrusions...