This is the follow-up article to my Introduction to the Advanced Intrusion Detection Environment (AIDE). It presents a Proof of Concept (PoC) that shows how AIDE can be remotely controlled using an Ansible role. Knowledge of the introductory article is assumed. Basic Ansible knowledge, such as the use of Ansible roles and the execution of […]
This introduction provides answers to the following questions: For this introduction I used RHEL 9 as my operating system of choice, but AIDE is available for other Linux distributions as well. In order to follow this introduction, you should be familiar with the basics of Linux system administration and at least know the following terms: […]
A Guide to Seamless Connectivity in OpenShift and OKD In today’s rapidly evolving technological landscape, the integration of complex architectures into our systems is becoming more prevalent than ever. One of these challenges is to consolidate a multi-cloud architecture into a true hybrid cloud one. In this blog post we will delve into the motivations, solutions, and considerations […]
Source: https://commons.wikimedia.org/wiki/File:Grand_Turk(34).jpg (Georges Jansoone) Abstract In the rapidly evolving landscape of software development, documentation of modifications and updates is crucial for maintaining project continuity and ensuring team alignment. This blog article introduces Conventional Changelog, a tool developed to address this very challenge. The tool transforms a project’s commit history into a detailed, readable changelog. Its […]
Introduction In this article I will put the spotlight on some aspects of the Open Source activities in the public sector in germany. While I have a few insights in some of these, I am currently unable to cover everything that is going on. So if I missed parts, please let me know through the […]
The Problem It’s getting worse. Every day. The global emissions of carbon dioxide are still increasing , while our global budget to stay in the range of 1.5° C and 2° C is rapidly exhausting. The main emissions are produced by burning fossil fuels for energy generation, transportation and industrial production. Another big source of […]
The potential of AI has been acknowledged for years, along with the understanding that data is the key driver of this potential. This realization sparked a gold rush to amass data, a pursuit driven more by the allure of future possibilities than by practical use cases. Consequently, this rush resulted in piles of rubble rather […]
We all know the limitations of building multi-architecture images on an infrastructure that is not providing all the expected CPU architectures. We also know that emulation of those architectures is something that can help us out of that dilemma. Unfortunately, switching CPU architectures within a highly restricted environment like an OpenShift cluster is hard to […]
Open source has become widely adopted as a default, making it easy to overlook its significance in the field of Data science. There is a need to appreciate the greater value in this area. Data scientists can enhance efficiency and improve work performance by utilizing Open source tools and frameworks, unlocking their full potential through […]
Introduction The topic “Denial of Service” (DoS) and “Distributed Denial of Service” (DDoS) is always a hot topic because it could happen at any time for any Service at any Layers. To understand what a (D)DoS is, let us explain what a “service” is, what possible attacks are available and why such a denial of […]