credativ® Blog

Here you will find interesting news about industry-specific topics and us.

Categories
Category
Tags

Categories

Tags

Tag: Linux

24 November 2024

Open Build Service - Utility to build and publish updated packages of an EOL distribution

Introduction When it comes to providing extended support for end-of-life (EOL) Linux distributions, the traditional method of building packages from sources may present certain challenges. One of the biggest challenges is the need for individual developers to install build dependencies on their own build environments. This often leads to different build dependencies being installed, resulting […]

Read more

15 July 2024

Run0 as a Sudo Alternative?

With version 256, systemd introduced run0. Lennart Poettering describes run0 as an alternative to sudo and explains on Mastodon at the same time what he sees as the problem with sudo. In this blog post, however, we do not want to go into the strengths or weaknesses of sudo, but take a closer look at […]

Read more

27 October 2023

All Systems Go! 2023

This years All Systems Go! took place on 2023-09-13 and 2023-09-14 at the nice location of Neue Mälzerei in Berlin, Germany. One Debian Developer and employee of NetApp had the opportunity to attend this conference: Bastian Blank. All Systems Go! focuses on low-level user-space for Linux systems. Everything that is above the kernel, but is […]

Read more

15 March 2022

Introduction to AppArmor

Fundamentally, access control under Linux is a simple matter: Files specify their access rights (execute, write, read) separately for their owner, their group, and finally, other users. Every process (whether a user’s shell or a system service) running on the system operates under a user ID and group ID, which are used for access control. […]

Read more

04 January 2018

The Processor as a Security Vulnerability

At the beginning of 2018, issues with memory management and Intel processors became public. According to these reports, it is apparently possible to read arbitrary areas of the kernel and userspace memory regions and thus potentially gain access to sensitive areas. Over the past few days, there have been rumors and speculations about the direction […]

Read more