6 C
London
Wednesday, November 22, 2017
Home Tags Operating systems

Tag: operating systems

Prometheus, the open source monitoring system for Docker-style containers running in cloud architectures, has formally released a 2.0 version with major architectural changes to improve its performance.Among the changes that have landed since the re...
Savitech provides USB audio drivers for a number of specialized audio products.
Some versions of the Savitech driver package silently install a root CA certificate into the Windows trusted root certificate store.
Fedora 27, the latest version of the Red Hat-sponsored Linux project that serves both as a user distribution and as a proving ground for new ideas in Red Hat Enterprise Linux, is set to arrive this week or next.The most important additions and chang...
Over the past six months I have reviewed five minimal Linux distributions that are optimized for running containers: Alpine Linux, CoreOS Container Linux, RancherOS, Red Hat Atomic Host, and VMware Photon OS.

Generically known as “container operating s...
EternalRomance exploit was used to move across networks after initial attack.
Days later it served malware, but the only visible damage was to Dell's reputation Dell forgot to re-register a domain names that many PCs it's sold use to do fresh installs of their operating systems.

The act of omission was spotted by a third-party w...
CoreOS Container Linux is an open-source container operating system designed to support Kubernetes.

The CoreOS flavor of container infrastructure management uses the Rocket or Docker container engine, Etcd for service discovery and configuration, Flann...
Docker announced today it will integrate an “unmodified” version of Google’s Kubernetes container-orchestration tool as a native part of Docker.

Docker said the Kubernetes integration will be available as a beta release, but gave no release date.Thi...
Android 6.0 hit especially hard, but all devices are vulnerable.
Bugs in widely used Dnsmasq give attackers remote control of vulnerable systems.
We're already used to the fact that complex cyberattacks use 0-day vulnerabilities, bypassing digital signature checks, virtual file systems, non-standard encryption algorithms and other tricks.
Sometimes, however, all of this may be done in much simpler ways, as was the case in the malicious campaign that we detected a while ago – we named it 'Microcin' after microini, one of the malicious components used in it.
Fitbit knows how to make an exercise device; what about a smartwatch?