Blog Posts Tagged with "LISA"

4085079c6fe0be2fd371ddbac0c3e7db

Sandboxing: Understanding System Containment

November 29, 2010 Added by:Jamie Adams

The idea of containment within an operating system is sometimes referred to as sandboxing. Some of the more popular technologies specifically designed to accomplish this come to mind: FreeBSD jails, Solaris Containers (including Solaris Zones), and SUSE Linux's AppArmor...

Comments  (5)

4085079c6fe0be2fd371ddbac0c3e7db

LISA 2010: Sysadmins Discuss Virtual Mentorship

November 23, 2010 Added by:Jamie Adams

There are system administrators focused on different operating systems, cluster specialists, network administrators, database administrators, system virtualization managers, and even security administrators. Our field also seems to have as many specialists as the medical community...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

LISA 2010: OS Security In The Cloud

November 21, 2010 Added by:Jamie Adams

Unused services should and must still be disabled, discretionary access controls tightened, and regular software updates applied. The same holds true when it comes to operating system images deployed in the cloud...

Comments  (0)