Showing 3 Result(s)

What about container security?

With normal legacy server security you would routinely scan your servers for vulnerabilities, but with the move to using containers this methodology for vulnerability detection doesn’t exactly fit as you would typically build the container and move it along through your environments during the software development life cycle. So how do we check our containers …

Ruby on Rails hosting by Web.com

Usually in the past I’ve done my web hosting on either one of the many servers I own or utilizing VPS hosting providers like VPSfarm.com, GrokThis.net or┬áLinode.com, but lately with the economy and a price that can’t be beat I’ve been using Web.com‘s Linux Hosting plan to meet my needs. This has met all my …

GnuPG Key Policy Manager

Taking GNU Privacy Guard key usage seriously I have had a published key usage policy that I embed the link into any GPG key signature when signing a key. After years of using PGP/GPG I have found that having an established usage and management policy is nice as it lets others know that you take …