These slides were part of a presentation given at HushCon East 2017. The talk covered how we can use big data to improve the effectiveness of offensive security tools.
Presentation on Pesantren Kilat Code Security
Tangerang, 2016-06-06
We talk about docker. What it is? Why it matters? and how it can benefit us?
This presentation is an introduction and delivered to local meetup in Indonesia.
In this session we introduce administrators to the concepts of Docker and discuss architectural decisions that will come into play when deploying containers. Although this session was originally presented as part of IBM's New Way To Learn initiative it does not discuss any specific aspects of IBM technology
A Survey of Container Security in 2016: A Security Update on Container PlatformsSalman Baset
This talk is an update of container security in 2016. It describes the security measures that containers provide, shows how containers provide security measures out of box that are prone to configuration errors when running applications directly on host, and finally lists the ongoing in container security in the community.
This document discusses running Oracle Database in Docker containers. It provides an overview of Docker and containers, and then describes how to run Oracle Database within a Docker container. Specifically, it outlines downloading prebuilt images from Docker Store or Oracle Store, or building a custom image using Dockerfiles in Oracle's GitHub repository. It also provides examples for running Docker commands to launch an Oracle Database container using these images.
This document summarizes Docker security features as of release 1.12. It discusses key security modules like namespaces, cgroups, capabilities, seccomp, AppArmor/SELinux that provide access control and isolation in Docker containers. It also covers multi-tenant security, image signing, TLS for daemon access, and best practices like using official images and regular updates.
Securing the Container Pipeline at Salesforce by Cem Gurkok Docker, Inc.
Customer trust and security is paramount for Salesforce. While containerization is great for DevOps due to flexibility, speed, isolation, transient existence, ease of management and patching, it becomes a challenging environment when the sensitivity level of the data traversing the environment increases. Monitoring systems, applications and network; performing disk, memory and network forensics in case of an incident; and vulnerability detection can easily become daunting tasks in such a volatile environment.
In this presentation we would like to discuss the infrastructure we have built to address these issues and to secure our Docker container platform while we rapidly containerize Salesforce. Our solutions focus on securing the container pipeline, building security into the architecture, monitoring, Docker forensics (disk, memory, network), and automation. We also would like to demonstrate some of our live memory analysis capabilities we leverage to assure container and application integrity during execution.
OSCON: Incremental Revolution - What Docker learned from the open-source fire...Docker, Inc.
Since Solomon Hykes unveiled Docker at the PyCon conference three years ago, containers have revolutionized how developers and ops teams build, ship, and run applications. Solomon explores the past, present, and future of our container ecosystem and shares lessons learned from managing successful open source projects across several dimensions: technology, people, products, and business.
Sign up for the Docker for Mac and Windows beta: beta.docker.com
Oracle CODE 2017 San Francisco: Docker on Raspi Swarm to OCCSFrank Munz
Docker Introduction: From Raspi Docker Swarm Cluster
to OCCS and Wercker. Recording https://www.youtube.com/watch?v=Cs7XmaI3OLc
Sharding Containers: Make Go Apps Computer-Friendly Again by Andrey Sibiryov Docker, Inc.
The document discusses how modern hardware has become more complex with multi-core, multi-socket CPUs and deep cache hierarchies. This complexity introduces latency and performance issues for software. The author describes their service that processes millions of requests per second spending a large amount of time on garbage collection, context switching, and CPU stalls. They developed a tool called Tesson that analyzes hardware topology and shards containerized applications across CPU cores, pinning linked components closer together to improve locality and performance. Tesson integrates with a local load balancer to distribute workloads efficiently utilizing the system resources.
Moving Legacy Applications to Docker by Josh Ellithorpe, Apcera Docker, Inc.
Looking to move your application to run in a container? Need to move existing x86 legacy applications to Docker? Let's break down your fundamental application concerns. This includes persistent storage, networking, configuration management, policy, logging, health monitoring, and service discovery. You won't want to miss this talk.
1. The document discusses setting up a private Docker registry using Docker Registry and Nginx on local, AWS EC2, and adding authentication with basic auth and HTTPS.
2. Key steps include running Docker Registry with port 5000, linking it to Nginx, and configuring Nginx as a reverse proxy. Authentication is added using htpasswd and securing access with HTTPS and self-signed certificates.
3. The process involves building a test image, pushing it to the local registry, then pushing it to the registry accessible at an external URL after configuring the necessary network, domain name, and security settings.
Microservices with Terraform, Docker and the Cloud. Chicago Coders Conference...Derek Ashmore
Much has been written about how to write Microservices, but not enough about how to effectively deploy and manage them. Microservices architecture multiplies the number of deployables IT has to manage by at least 10x. In that world, tooling to manage cloud deployments and related infrastructure becames essential for success. Terraform and Docker are increasingly being leveraged to facilitate microservice environments. Terraform has become becoming the leading coding framework for building and managing change in cloud environments.
Attendees will learn best practices for deploying and managing microservices in production. We will leverage true "infrastructure as code" using Terraform. That code is easily re-used and make changes easy. That code makes it easy to deploy and scale software including Docker images. You will learn not only how to establish that environment initially, but how changes can be effectively managed. I'll cover best practices and common mistakes along the way. AWS will be used as the cloud provider, but Terraform operates seemlessly on other cloud environments as well.
This session is targeted at architects and team leads. This session is intended to be platform-generic.
Kali Linux Installation - VMware
Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution.
Preinstalled with numerous penetration-testing programs.
Docker in the Oracle Universe / WebLogic 12c / OFM 12cFrank Munz
This document discusses Docker and provides an overview presented by Frank Munz. Some key points:
- Docker is an open-source container technology that provides portable application isolation using Linux kernel features like namespaces and cgroups.
- Docker images contain layered filesystems for applications and dependencies. Containers run the images and provide isolated, lightweight runtimes.
- Docker solves issues around environment consistency by packaging applications and dependencies together. Images can be pulled from public registries or built locally.
- Security with Docker involves using trusted images, dropping privileges, and combining with tools like SELinux. Public clouds provide additional isolation over plain Docker containers.
- Oracle supports Docker for several of its products like Web
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...Docker, Inc.
Ugly connectivity challenges in your development and production environments.
The good: Advances in container networking in the past year, including the emergence of “Micro SDNs” as the way to simplify Docker deployments
The bad: Understanding live network behavior and troubleshooting
The ugly: Multicast, security, robustness and resiliency at scale
In this talk you will learn how to weave Dockerized microservices together without tying yourself in knots or putting your head in a noose. You’ll learn how to effectively use micro SDNs, service discovery and request routing. You'll also see how to solve the bad and the ugly connectivity challenges in your development and production environments.
Software image installs on x86 server and SAN storage, VM, or cloud in under an hour. Delphix for SQL Server uses a proxy host to restore a full backup of the source database and then maintains synchronization through restoring transaction log backups as they become available, constructing a TimeFlow. Virtual databases can then be provisioned instantly from snapshots with no database recovery required.
Global Software Development powered by PerforcePerforce
From inception to sunset, hundreds of people from around the world are involved in the production and live operations of video games developed by Electronic Arts. An overview of how EA uses a variety of features in Perforce Helix to effectively utilize its world wide talent pool, develop software efficiently, and protect its intellectual property.
The document discusses the importance of diversity and inclusion in the workplace. It notes that a diverse workforce leads to better problem solving and decision making by bringing in a variety of perspectives. The document recommends that companies implement diversity training for all employees and promote a culture of acceptance across differences to reap the benefits of diversity.
Cem Gurkok presented on containers and security. The presentation covered threats to containers like container exploits and tampering of images. It discussed securing the container pipeline through steps like signing, authentication, and vulnerability scans. It also covered monitoring containers and networks, digital forensics techniques, hardening containers and hosts, and vulnerability management.
Whats new in Microsoft Windows Server 2016 Clustering and StorageJohn Moran
In this webinar we will learn what the High Availability & Storage team in Microsoft has cooked up for us in Windows Server 2016, which is being launched at Microsoft Ignite at the end of September.
There’s lots of new stuff in this release, including better high availability for Hyper-V, greater control over resource utilization, improved fault tolerance of transient events, newer design options for stretch or multi-site clusters, a whole new way of doing software defined storage with SATA and NVMe drives, built-in block-level storage replication, and hyper-convergence without having to break the bank.
Dockers & kubernetes detailed - Beginners to GeekwiTTyMinds1
Docker is a platform for building, distributing and running containerized applications. It allows applications to be bundled with their dependencies and run in isolated containers that share the same operating system kernel. Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. It groups Docker containers that make up an application into logical units for easy management and discovery. Docker Swarm is a native clustering tool that can orchestrate and schedule containers on machine clusters. It allows Docker containers to run as a cluster on multiple Docker hosts.
This document provides an introduction to Docker, including what Docker is, why it matters, and how it works. Some key points:
- Docker implements lightweight containers that provide process isolation using features of the Linux kernel like cgroups and namespaces. It allows building and shipping applications without dependency and compatibility issues.
- Docker solves the "N times N" compatibility problem that arises when applications need to run in different environments. Its portable containers and standardized operations help automate development and deployment workflows.
- Containers isolate applications from one another and their dependencies without the overhead of virtual machines. This makes them lightweight and efficient while still providing isolation of applications and flexibility to run anywhere.
Introduction to Containers - SQL Server and DockerChris Taylor
Containers provide lightweight virtualization that packages applications and dependencies together. The document introduces containers and Docker, discusses the differences between containers and virtual machines, and covers key Docker concepts like images, Dockerfiles, Docker Hub, and running SQL Server in containers. It also addresses container setup, licensing, and performance considerations for using containers with SQL Server.
Christopher Grayson discusses authentication, passwords, how to break password-based authentication schemes, and lastly introduces LavaPasswordFactory.
LavaPasswordFactory is a password list generation tool that also contains functionality for cleaning password lists based on password policies.
This talk by Chris Grayson contains lots of information about how to enter the so-called "hackerspace." From mental approaches to books, movies, and other media to online courses and knowledge repositories, this presentation is intended to be the one-stop-shop for anyone trying to become a penetration tester.
Securing the Container Pipeline at Salesforce by Cem Gurkok Docker, Inc.
Customer trust and security is paramount for Salesforce. While containerization is great for DevOps due to flexibility, speed, isolation, transient existence, ease of management and patching, it becomes a challenging environment when the sensitivity level of the data traversing the environment increases. Monitoring systems, applications and network; performing disk, memory and network forensics in case of an incident; and vulnerability detection can easily become daunting tasks in such a volatile environment.
In this presentation we would like to discuss the infrastructure we have built to address these issues and to secure our Docker container platform while we rapidly containerize Salesforce. Our solutions focus on securing the container pipeline, building security into the architecture, monitoring, Docker forensics (disk, memory, network), and automation. We also would like to demonstrate some of our live memory analysis capabilities we leverage to assure container and application integrity during execution.
OSCON: Incremental Revolution - What Docker learned from the open-source fire...Docker, Inc.
Since Solomon Hykes unveiled Docker at the PyCon conference three years ago, containers have revolutionized how developers and ops teams build, ship, and run applications. Solomon explores the past, present, and future of our container ecosystem and shares lessons learned from managing successful open source projects across several dimensions: technology, people, products, and business.
Sign up for the Docker for Mac and Windows beta: beta.docker.com
Oracle CODE 2017 San Francisco: Docker on Raspi Swarm to OCCSFrank Munz
Docker Introduction: From Raspi Docker Swarm Cluster
to OCCS and Wercker. Recording https://www.youtube.com/watch?v=Cs7XmaI3OLc
Sharding Containers: Make Go Apps Computer-Friendly Again by Andrey Sibiryov Docker, Inc.
The document discusses how modern hardware has become more complex with multi-core, multi-socket CPUs and deep cache hierarchies. This complexity introduces latency and performance issues for software. The author describes their service that processes millions of requests per second spending a large amount of time on garbage collection, context switching, and CPU stalls. They developed a tool called Tesson that analyzes hardware topology and shards containerized applications across CPU cores, pinning linked components closer together to improve locality and performance. Tesson integrates with a local load balancer to distribute workloads efficiently utilizing the system resources.
Moving Legacy Applications to Docker by Josh Ellithorpe, Apcera Docker, Inc.
Looking to move your application to run in a container? Need to move existing x86 legacy applications to Docker? Let's break down your fundamental application concerns. This includes persistent storage, networking, configuration management, policy, logging, health monitoring, and service discovery. You won't want to miss this talk.
1. The document discusses setting up a private Docker registry using Docker Registry and Nginx on local, AWS EC2, and adding authentication with basic auth and HTTPS.
2. Key steps include running Docker Registry with port 5000, linking it to Nginx, and configuring Nginx as a reverse proxy. Authentication is added using htpasswd and securing access with HTTPS and self-signed certificates.
3. The process involves building a test image, pushing it to the local registry, then pushing it to the registry accessible at an external URL after configuring the necessary network, domain name, and security settings.
Microservices with Terraform, Docker and the Cloud. Chicago Coders Conference...Derek Ashmore
Much has been written about how to write Microservices, but not enough about how to effectively deploy and manage them. Microservices architecture multiplies the number of deployables IT has to manage by at least 10x. In that world, tooling to manage cloud deployments and related infrastructure becames essential for success. Terraform and Docker are increasingly being leveraged to facilitate microservice environments. Terraform has become becoming the leading coding framework for building and managing change in cloud environments.
Attendees will learn best practices for deploying and managing microservices in production. We will leverage true "infrastructure as code" using Terraform. That code is easily re-used and make changes easy. That code makes it easy to deploy and scale software including Docker images. You will learn not only how to establish that environment initially, but how changes can be effectively managed. I'll cover best practices and common mistakes along the way. AWS will be used as the cloud provider, but Terraform operates seemlessly on other cloud environments as well.
This session is targeted at architects and team leads. This session is intended to be platform-generic.
Kali Linux Installation - VMware
Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution.
Preinstalled with numerous penetration-testing programs.
Docker in the Oracle Universe / WebLogic 12c / OFM 12cFrank Munz
This document discusses Docker and provides an overview presented by Frank Munz. Some key points:
- Docker is an open-source container technology that provides portable application isolation using Linux kernel features like namespaces and cgroups.
- Docker images contain layered filesystems for applications and dependencies. Containers run the images and provide isolated, lightweight runtimes.
- Docker solves issues around environment consistency by packaging applications and dependencies together. Images can be pulled from public registries or built locally.
- Security with Docker involves using trusted images, dropping privileges, and combining with tools like SELinux. Public clouds provide additional isolation over plain Docker containers.
- Oracle supports Docker for several of its products like Web
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...Docker, Inc.
Ugly connectivity challenges in your development and production environments.
The good: Advances in container networking in the past year, including the emergence of “Micro SDNs” as the way to simplify Docker deployments
The bad: Understanding live network behavior and troubleshooting
The ugly: Multicast, security, robustness and resiliency at scale
In this talk you will learn how to weave Dockerized microservices together without tying yourself in knots or putting your head in a noose. You’ll learn how to effectively use micro SDNs, service discovery and request routing. You'll also see how to solve the bad and the ugly connectivity challenges in your development and production environments.
Software image installs on x86 server and SAN storage, VM, or cloud in under an hour. Delphix for SQL Server uses a proxy host to restore a full backup of the source database and then maintains synchronization through restoring transaction log backups as they become available, constructing a TimeFlow. Virtual databases can then be provisioned instantly from snapshots with no database recovery required.
Global Software Development powered by PerforcePerforce
From inception to sunset, hundreds of people from around the world are involved in the production and live operations of video games developed by Electronic Arts. An overview of how EA uses a variety of features in Perforce Helix to effectively utilize its world wide talent pool, develop software efficiently, and protect its intellectual property.
The document discusses the importance of diversity and inclusion in the workplace. It notes that a diverse workforce leads to better problem solving and decision making by bringing in a variety of perspectives. The document recommends that companies implement diversity training for all employees and promote a culture of acceptance across differences to reap the benefits of diversity.
Cem Gurkok presented on containers and security. The presentation covered threats to containers like container exploits and tampering of images. It discussed securing the container pipeline through steps like signing, authentication, and vulnerability scans. It also covered monitoring containers and networks, digital forensics techniques, hardening containers and hosts, and vulnerability management.
Whats new in Microsoft Windows Server 2016 Clustering and StorageJohn Moran
In this webinar we will learn what the High Availability & Storage team in Microsoft has cooked up for us in Windows Server 2016, which is being launched at Microsoft Ignite at the end of September.
There’s lots of new stuff in this release, including better high availability for Hyper-V, greater control over resource utilization, improved fault tolerance of transient events, newer design options for stretch or multi-site clusters, a whole new way of doing software defined storage with SATA and NVMe drives, built-in block-level storage replication, and hyper-convergence without having to break the bank.
Dockers & kubernetes detailed - Beginners to GeekwiTTyMinds1
Docker is a platform for building, distributing and running containerized applications. It allows applications to be bundled with their dependencies and run in isolated containers that share the same operating system kernel. Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. It groups Docker containers that make up an application into logical units for easy management and discovery. Docker Swarm is a native clustering tool that can orchestrate and schedule containers on machine clusters. It allows Docker containers to run as a cluster on multiple Docker hosts.
This document provides an introduction to Docker, including what Docker is, why it matters, and how it works. Some key points:
- Docker implements lightweight containers that provide process isolation using features of the Linux kernel like cgroups and namespaces. It allows building and shipping applications without dependency and compatibility issues.
- Docker solves the "N times N" compatibility problem that arises when applications need to run in different environments. Its portable containers and standardized operations help automate development and deployment workflows.
- Containers isolate applications from one another and their dependencies without the overhead of virtual machines. This makes them lightweight and efficient while still providing isolation of applications and flexibility to run anywhere.
Introduction to Containers - SQL Server and DockerChris Taylor
Containers provide lightweight virtualization that packages applications and dependencies together. The document introduces containers and Docker, discusses the differences between containers and virtual machines, and covers key Docker concepts like images, Dockerfiles, Docker Hub, and running SQL Server in containers. It also addresses container setup, licensing, and performance considerations for using containers with SQL Server.
Christopher Grayson discusses authentication, passwords, how to break password-based authentication schemes, and lastly introduces LavaPasswordFactory.
LavaPasswordFactory is a password list generation tool that also contains functionality for cleaning password lists based on password policies.
This talk by Chris Grayson contains lots of information about how to enter the so-called "hackerspace." From mental approaches to books, movies, and other media to online courses and knowledge repositories, this presentation is intended to be the one-stop-shop for anyone trying to become a penetration tester.
This is a presentation that was given to the Grey H@t organization at Georgia Tech that covered all of the progress the organization made in the academic year 2012-2013.
This document discusses DNS cache poisoning. It begins by explaining what DNS is and its purpose of mapping domain names to IP addresses. It then discusses how DNS servers implement caching to improve performance and defines DNS cache poisoning as getting unauthorized entries into a DNS server's cache. The document outlines how an attacker could poison a cache to redirect traffic to a machine they control in order to perform man-in-the-middle attacks or install malware. It describes various methods of poisoning caches locally or remotely, such as between end users and nameservers or between nameservers themselves using the Kaminsky attack. Defenses like DNSSEC are mentioned along with encouragement to try cache poisoning in a controlled lab environment.
Root the Box - An Open Source Platform for CTF AdministrationChristopher Grayson
The document discusses Root the Box, an open-source platform for cybersecurity capture the flag (CTF) competitions. It outlines plans to partner with Georgia Tech Research Institute (GTRI) to host a large CTF event in Atlanta, with the goals of educating 400+ attendees and introducing high school and college students to information security. It also provides an overview of the Root the Box software and resources for training, such as vulnerable practice systems and ongoing online competitions.
Cross-site scripting (XSS) and cross-site request forgery (XSRF) are two related web application vulnerabilities. XSS involves injecting malicious scripts into a web application to steal user data or perform actions on the user's behalf. XSRF tricks authenticated users into performing actions in a web application by submitting forged requests, since their browser will automatically include authentication cookies. While mitigations like validating HTTP referrers can help prevent XSRF, XSS can still be used to bypass these by scraping tokens or directly launching attacks from within compromised pages. Together, XSS and XSRF pose serious risks if not properly mitigated in web applications that handle sensitive data or perform sensitive actions.
This presentation by Christopher Grayson covers some lessons learned as a security professional that has made his way into software engineering full time.
Cohesion Techsessie Docker - Daniel PalstraDaniel Palstra
This document summarizes a presentation about Docker. It discusses why Docker is useful for cloud computing, how it aims to reduce the time between writing code and deploying it, and how Docker is now widely used without much notice. It then covers topics like the difference between Docker images and containers, building Dockerfiles, linking and networking containers, logging inspection, the Docker Hub registry, and orchestration tools like Docker Machine, Swarm and Compose. The presentation highlights pros like standardized deployments and easy DevOps workflows, and cons like complexity and a rapidly evolving ecosystem.
IBM Bluemix Paris Meetup #14 - Le Village by CA - 20160413 - Introduction à D...IBM France Lab
This document discusses Docker and how IBM uses Docker for ODM (Operational Decision Management). Some key points:
- Docker allows decoupling applications from the underlying infrastructure and providing consistent runtime environments and operations.
- IBM leverages Docker for ODM on Cloud, running ODM in Docker containers on a predefined set of VMs managed by Docker Swarm.
- Internally, IBM is working to Dockerize existing ODM runtimes by running product components like RES and Decision Center in separate Docker containers connected via REST APIs. This aims to provide a homogeneous software delivery, topology and operations using Docker.
This document provides an overview of Docker and the author's experience. It discusses key Docker concepts like images, containers, the Dockerfile and Docker Engine. It also summarizes Docker benefits like portability, scalability and efficiency. Components like Docker Hub, Docker Machine and orchestration tools are briefly introduced. Security considerations and using Docker in production are also mentioned.
The slides talk about Docker and container terminologies but will also be able to see the big picture of where & how it fits into your current project/domain.
Topics that are covered:
1. What is Docker Technology?
2. Why Docker/Containers are important for your company?
3. What are its various features and use cases?
4. How to get started with Docker containers.
5. Case studies from various domains
This document provides an introduction and overview of Docker and containers. It discusses what containers are, how they differ from virtual machines, and how Docker works. Key points covered include common Docker commands, the Docker architecture, building images with Dockerfiles, and using Docker Compose to run multi-container applications. The benefits of containers for streamlining deployment and rapid scaling are also highlighted.
Introduction to Docker | Docker and Kubernetes TrainingShailendra Chauhan
Learn to build modern infrastructure using docker and Kubernetes containers. Develop and deploy your ASP.NET Core application using Docker. Leverage to learn container technology to build your ASP.NET Core application.
Introduction Docker and Kubernetes | Docker & Kubernetes Tutorial | Dot Net T...Dot Net Tricks
This document provides an agenda for an introduction to Docker training. It includes sections on container platforms, why containers, virtual machines vs containers, Docker basics like images and containers, and Docker Engine architecture. The training will cover topics like containerization, microservices, and deploying and managing applications with Docker.
Brief overview of the Docker eco system, the paradigm change it brings to development and operations processes. While docker has lots of potential its still working to mature into a viable production system that has proved itself secure, stable, and viable.
Docker 101 - Zaragoza Docker Meetup - Universidad de ZaragozaAngel Borroy López
This document provides an introduction to Docker presented at a Docker Zaragoza Meetup. It discusses Docker Engine, images and containers, Docker architecture, creating images with Dockerfiles, sharing images with Docker registries like Docker Hub, and hands-on exercises using Docker Classroom and Play with Docker. The presentation introduces key Docker concepts and components to help attendees discover Docker and get started using it.
Docker allows applications to be packaged with all their dependencies and run seamlessly on any infrastructure. It provides lightweight containers that share resources more efficiently than virtual machines. Containers can be created from Docker images which act as templates and contain instructions for creating containers. The Docker architecture consists of clients, hosts, and a registry where images are stored and shared.
Docker allows developers to package applications with dependencies into standardized units for development and deployment. It provides lightweight containers that run applications securely isolated from the host system and other containers. Key Docker components include images, which are read-only templates used to create and deploy containers as executable instances of the packaged application.
Docker allows developers to package applications and dependencies into standardized units called containers. This ensures applications will run the same regardless of environment. Docker addresses issues developers face around long development cycles, bugs between environments, and inconsistent environments. It provides lightweight virtualization that builds, ships and runs distributed applications. Docker improves the software development process by allowing consistent environments for development, testing and production which speeds delivery and reduces bugs.
What is this Docker and Microservice thing that everyone is talking about? A primer to Docker and Microservice and how the two concepts complement each other.
Docker is an open source containerization platform that allows users to package applications and their dependencies into standardized executable units called containers. Docker relies on features of the Linux kernel like namespaces and cgroups to provide operating-system-level virtualization and allow containers to run isolated on a shared kernel. This makes Docker highly portable and allows applications to run consistently regardless of the underlying infrastructure. Docker uses a client-server architecture where the Docker Engine runs in the cloud or on-premises and clients interact with it via Docker APIs or the command line. Common commands include build to create images from Dockerfiles, run to launch containers, and push/pull to distribute images to registries. Docker is often used for microservices and multi-container
Presentation about docker from Java User Group in Ostrava CZ (23th of November 2015). Presented by Martin Damovsky (@damovsky).
Demos are available at https://github.com/damovsky/jug-ostrava-docker
Dockerize the World - presentation from Hradec Kralovedamovsky
This document provides an introduction and overview of Docker delivered in a presentation format. It includes:
1. An agenda that covers Docker introduction, demos, Docker in the cloud, IoT and Docker, and news from DockerCon conferences.
2. Background on the presenter and a poll asking who knows and uses Docker in production.
3. Explanations of what Docker is, how it works using Linux kernel features, and its motto of Build, Ship, Run.
4. Mention of links to the presenter's Docker demos and an open source project called Yowie.
This document provides an overview of Docker technologies including Docker Engine, Docker Machine, Docker Kitematic, Docker Compose, Docker Swarm, Docker Registry, Docker Content Trust, Docker Networking, and Docker Universal Control Plane. It describes what each technology is used for, provides examples, and references additional resources for further information.
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingsteve198109
Vancouver in 2025 is more than scenic views, yoga studios, and oat milk lattes—it’s a thriving hub for eco-conscious entrepreneurs looking to make a real difference. If you’ve ever dreamed of launching a purpose-driven business, now is the time. Whether it’s urban mushroom farming, upcycled furniture sales, or vegan skincare sold online, your green idea deserves a strong digital foundation.
The 2025 Canadian eCommerce landscape is being shaped by trends like sustainability, local innovation, and consumer trust. To stay ahead, eco-startups need reliable hosting that aligns with their values. That’s where 4GoodHosting.com comes in—one of the top-rated Vancouver web hosting providers of 2025. Offering secure, sustainable, and Canadian-based hosting solutions, they help green entrepreneurs build their brand with confidence and conscience.
As eCommerce in Canada embraces localism and environmental responsibility, choosing a hosting provider that shares your vision is essential. 4GoodHosting goes beyond just hosting websites—they champion Canadian businesses, sustainable practices, and meaningful growth.
So go ahead—start that eco-friendly venture. With Vancouver web hosting from 4GoodHosting, your green business and your values are in perfect sync.
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC
Terry Sweetser, Training Delivery Manager (South Asia & Oceania) at APNIC presented an APNIC update at NZNOG 2025 held in Napier, New Zealand from 9 to 11 April 2025.
Best web hosting Vancouver 2025 for you businesssteve198109
Vancouver in 2025 is more than scenic views, yoga studios, and oat milk lattes—it’s a thriving hub for eco-conscious entrepreneurs looking to make a real difference. If you’ve ever dreamed of launching a purpose-driven business, now is the time. Whether it’s urban mushroom farming, upcycled furniture sales, or vegan skincare sold online, your green idea deserves a strong digital foundation.
The 2025 Canadian eCommerce landscape is being shaped by trends like sustainability, local innovation, and consumer trust. To stay ahead, eco-startups need reliable hosting that aligns with their values. That’s where 4GoodHosting.com comes in—one of the top-rated Vancouver web hosting providers of 2025. Offering secure, sustainable, and Canadian-based hosting solutions, they help green entrepreneurs build their brand with confidence and conscience.
As eCommerce in Canada embraces localism and environmental responsibility, choosing a hosting provider that shares your vision is essential. 4GoodHosting goes beyond just hosting websites—they champion Canadian businesses, sustainable practices, and meaningful growth.
So go ahead—start that eco-friendly venture. With Vancouver web hosting from 4GoodHosting, your green business and your values are in perfect sync.
Smart Mobile App Pitch Deck丨AI Travel App Presentation Templateyojeari421237
🚀 Smart Mobile App Pitch Deck – "Trip-A" | AI Travel App Presentation Template
This professional, visually engaging pitch deck is designed specifically for developers, startups, and tech students looking to present a smart travel mobile app concept with impact.
Whether you're building an AI-powered travel planner or showcasing a class project, Trip-A gives you the edge to impress investors, professors, or clients. Every slide is cleanly structured, fully editable, and tailored to highlight key aspects of a mobile travel app powered by artificial intelligence and real-time data.
💼 What’s Inside:
- Cover slide with sleek app UI preview
- AI/ML module implementation breakdown
- Key travel market trends analysis
- Competitor comparison slide
- Evaluation challenges & solutions
- Real-time data training model (AI/ML)
- “Live Demo” call-to-action slide
🎨 Why You'll Love It:
- Professional, modern layout with mobile app mockups
- Ideal for pitches, hackathons, university presentations, or MVP launches
- Easily customizable in PowerPoint or Google Slides
- High-resolution visuals and smooth gradients
📦 Format:
- PPTX / Google Slides compatible
- 16:9 widescreen
- Fully editable text, charts, and visuals
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC
Joyce Chen, Senior Advisor, Strategic Engagement at APNIC, presented on 'APNIC Policy Development Process' at the Local APIGA Taiwan 2025 event held in Taipei from 19 to 20 April 2025.
DNS Resolvers and Nameservers (in New Zealand)APNIC
Geoff Huston, Chief Scientist at APNIC, presented on 'DNS Resolvers and Nameservers in New Zealand' at NZNOG 2025 held in Napier, New Zealand from 9 to 11 April 2025.
Understanding the Tor Network and Exploring the Deep Webnabilajabin35
While the Tor network, Dark Web, and Deep Web can seem mysterious and daunting, they are simply parts of the internet that prioritize privacy and anonymity. Using tools like Ahmia and onionland search, users can explore these hidden spaces responsibly and securely. It’s essential to understand the technology behind these networks, as well as the risks involved, to navigate them safely. Visit https://torgol.com/
Reliable Vancouver Web Hosting with Local Servers & 24/7 Supportsteve198109
Looking for powerful and affordable web hosting in Vancouver? 4GoodHosting offers premium Canadian web hosting solutions designed specifically for individuals, startups, and businesses across British Columbia. With local data centers in Vancouver and Toronto, we ensure blazing-fast website speeds, superior uptime, and enhanced data privacy—all critical for your business success in today’s competitive digital landscape.
Our Vancouver web hosting plans are packed with value—starting as low as $2.95/month—and include secure cPanel management, free domain transfer, one-click WordPress installs, and robust email support with anti-spam protection. Whether you're hosting a personal blog, business website, or eCommerce store, our scalable cloud hosting packages are built to grow with you.
Enjoy enterprise-grade features like daily backups, DDoS protection, free SSL certificates, and unlimited bandwidth on select plans. Plus, our expert Canadian support team is available 24/7 to help you every step of the way.
At 4GoodHosting, we understand the needs of local Vancouver businesses. That’s why we focus on speed, security, and service—all hosted on Canadian soil. Start your online journey today with a reliable hosting partner trusted by thousands across Canada.
6. Docker 101
• Virtualization platform
• Virtualizes at the process level
• Runs in Linux
• Uses Linux kernel isolation primitives
7. Ok, But
Why?
• Consider traditional application of virtualization
• Significant overhead (single virtual host -> single virtual
application)
• Why virtualize at the OS level?
10. …Still Not
Convinced?
• When virtualization occurs at the process level, new
possibilities emerge
• Docker is not the first attempt, but has gotten a lot
right with their attempt
12. Docker
Engine
• Daemon that listens onTCP 2376 (3376 for swarm)
• Functionality invoked through API
• Command line interface provided by Docker
• Takes in images and settings, spins up “containers”
(processes)
15. Docker Build
Example
Build an image through “docker build”
List all images available to the Docker
daemon through “docker images”
16. Docker
Engine
Steps
1. Create image
2. Ensure target docker daemon has access to image
3. Tell the daemon to run the image, and pass
arguments as necessary
4. ???
5. Profit
17. Docker
Engine
Perks
• Hierarchical organization of Docker images works well
with standard DevOps practices
• If an image runs in one location through a Docker
daemon, it is guaranteed to work on all other same-
version Docker daemons
• Rid yourself of dealing with dependency headaches
18. Docker
Registry
• Where Git has GitHub, Docker has Docker Registry
• Version control-esque endpoint for storing Docker
images
• Docker officially offers Docker Hub
• Can (and should) create and run your own Docker
registry
20. Docker
Registry
Perks
• Single, authoritative location to store your Docker
images
• Follows the central repository model of Git, SVN, other
version control systems
• …my least favorite part of Docker
21. Docker
Machine
• Create new Docker daemons on local or remote hosts
• Remote hosts supported across all major hosting and
cloud providers
• Commands to create machines mostly the same – only
changes reflect API differences between providers
• Spins up host, installs docker, installs cryptographic
artifacts for secure communication
24. Docker
Machine
Cont’d
• Many other machine-specific functions available
through docker-machine
• Hardware/OS related? docker-machine does it
25. Docker
Machine
Perks
• Provider agnostic, and very easy to switch between
hosting providers (change a few command line
arguments)
• Go from no infrastructure to full infrastructure in <5
minutes
• Go from full infrastructure to no infrastructure in <30
seconds
26. Docker
Compose
• The “orchestration” tool of the Docker ecosystem
• Enables spinning up N-tier applications in one fell
swoop
• Can spin up N-tier applications locally
• Only requires a docker-compose.yml file to spin up
complicated N-tier applications
27. Docker
Compose File
Example
Defines the various applications contained
within the N-tier application
Configuration passed to applications
through environment variables
Defines relationships between applications
and host OS
28. Docker
Compose
Example
Call docker-compose in a directory
containing docker-compose.yml file
File is read, images are retrieved,
containers are created
N-tier application goes from non-existent
to up and running in <30 seconds
29. Docker
Compose
Cont’d
• Reduces configuration management complexity to a
single config file
• Spin up overlay networks across disparate hosting
providers on the fly
• View logs across N-tier application in real time
30. Docker
Compose
Perks
• Can configure entire environment with one
configuration file
• Reduces the complexity of N-tier application
deployment and debugging
• Go from 0->60 and 60->0 faster than all traditional
approaches
31. Docker
Swarm
• Turn multiple separate physical hosts into a single
logical host
• Out of the box management of which containers are
deployed where without headache of configuration
• Fully configurable to any depth
34. Docker
Swarm
Perks
• Difference between deploying to a single host and
deploying to 100 hosts is minimal – code does not
change between the two
• Transparently increase / decrease the power of your
distributed applications on the fly
• Single logical host across disparate hosts – even if
those hosts are in completely differeny physical
locations
35. Docker
Ecosystem
Review
• Docker Engine
– The core “runtime” of the Docker ecosystem – takes in
Docker images and spins up isolated “containers.”
• Docker Registry
– Enables the storage of Docker images in centralized fashion
• Docker Machine
– Create and/or destroy Docker daemons on local or remote
computing resources, automatically configure access to
these daemons
• Docker Compose
– Spin up/down N-tier applications in rapid fashion, drill down
into N-tier deployment options as necessary
• Docker Swarm
– Turn multiple physical or virtual hosts into a single logical
host as far as Docker daemon is concerned
37. Putting it
All Together
• Docker is a core component ofWeb Sight.IO
• One of the main reasons I’ve been able to stay a one-
man shop
• Reduced my need for DevOps assistance to nearly
nothing
39. Nothing is
Perfect
• Various Docker offerings written in different languages
• Terminology has not been consolidated across
offerings
• Still very much in development – breaking bugs
introduced in even minor version updates
• Docker networking not particularly robust (userland
UDP proxy?)
• Documentation could use work
• Standard ways of working with virtualization platforms
don’t necessarily translate to working with Docker
(learning curve)
• Not sure what the business plan is for Docker
enterprise
• Isolation is not as strong as traditionalVM isolation
41. The Good • Docker’s security team is top-notch
• Traditional security flaws in Docker have been rapidly
addressed, and their respective fixes have been either
industry-leading or industry-standard
• Enterprise business depends heavily on building secure
software, so large incentives to continue improving
• Logical abstraction of N-tier application -> single
application reduces complexity
• New defenses possible when set up and tear down of
environments takes seconds
42. The Bad
• Docker containers designed to run as root out-of-the-
box, require additional configuration and headaches to
change
• Intra-container communication may be restricted, but
otherwise Docker containers have same network
access as host machine
• Lots of code written by lots of people in different
languages doing complex things at all levels of the OS –
plenty of places for things to go wrong
43. The Ugly • Biggest dangers of using Docker are architectural
• If you thought losing your source code was bad, what
happens when you lose all of your images?
• Documentation for setting up your own Registry is very
poor
• Docker Registry has two levels of authentication – auth’ed
and not auth’ed
• Docker daemons, if compromised, would allow malicious
third-parties to spin up arbitrary software without dealing
with dependencies behind your firewall
45. On Docker
Ecosystem
• Throw out what you think you know about
virtualization when first wrapping your head around
the Docker ecosystem
• Docker’s individual offerings are impressive, but their
utility pales in comparison to what all of their offerings
taken as a complete whole can accomplish
46. On Docker
Security
• For the most part, Docker security is good
• Traditional security flaws will still be present within
Docker and the applications built upon it, and the
speed of operations with Docker gives Docker the leg
up when compared to traditional approaches
• The biggest security concern organizations should
have when deploying with Docker should revolve
around architectural implications of their Docker
deployment and considerations around the possibility
of compromised Docker assets