No Image

How to Scaffold a Java Project and Build a Kubernetes-Native App

2023-02-10 KENNETH 0

How to Scaffold a Java Project and Build a Kubernetes-Native App Right now, millions of Java developers are spending a ton of time and effort to optimize application performance. They’re working on cloud‑based business requirements that range from web to mobile, AI/ML, and edge. One of the biggest roadblocks they face is the poor compatibility between Java and Kubernetes. Even simple fixes are time‑consuming because developers have to learn and adopt unfamiliar run‑time environments and programming languages. This is where scaffolding the project can save time and headaches. What Is Scaffolding? In software development, scaffolding refers to creating temporary or generic code while a program is being developed and tested. Less complex examples include adding code to test for runtime errors and creating a mockup of a form‑fill page. This mockup, or scaffold, behaves how the final form‑fill will behave, [ more… ]

No Image

USN-5851-1: Linux kernel vulnerabilities

2023-02-10 KENNETH 0

USN-5851-1: Linux kernel vulnerabilities It was discovered that a memory leak existed in the Unix domain socket implementation of the Linux kernel. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2022-3543) It was discovered that the Bluetooth HCI implementation in the Linux kernel did not properly deallocate memory in some situations. An attacker could possibly use this cause a denial of service (memory exhaustion). (CVE-2022-3619) It was discovered that the hugetlb implementation in the Linux kernel contained a race condition in some situations. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information (kernel memory). (CVE-2022-3623) It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform bounds checking in some situations. A physically proximate attacker could use this [ more… ]

No Image

USN-5835-5: Nova vulnerability

2023-02-09 KENNETH 0

USN-5835-5: Nova vulnerability USN-5835-3 fixed vulnerabilities in Nova. This update provides the corresponding updates for Ubuntu 18.04 LTS. Original advisory details: Guillaume Espanel, Pierre Libeau, Arnaud Morin, and Damien Rannou discovered that Nova incorrectly handled VMDK image processing. An authenticated attacker could possibly supply a specially crafted VMDK flat image and obtain arbitrary files from the server containing sensitive information. Source: USN-5835-5: Nova vulnerability

No Image

USN-5850-1: Linux kernel vulnerabilities

2023-02-09 KENNETH 0

USN-5850-1: Linux kernel vulnerabilities It was discovered that the Bluetooth HCI implementation in the Linux kernel did not properly deallocate memory in some situations. An attacker could possibly use this cause a denial of service (memory exhaustion). (CVE-2022-3619) It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform bounds checking in some situations. A physically proximate attacker could use this to craft a malicious USB device that when inserted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3628) It was discovered that a use-after-free vulnerability existed in the Bluetooth stack in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3640) Tamás Koczka discovered that the Bluetooth L2CAP implementation in the Linux kernel did [ more… ]

[도서] 쉽게 따라하는 스마트폰 기초 교재

2023-02-09 KENNETH 0

[도서] 쉽게 따라하는 스마트폰 기초 교재 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]쉽게 따라하는 스마트폰 기초 교재 김미선 저 | 에스엔에스소통연구소 | 2023년 02월 판매가 18,000원 (10%할인) | YES포인트 1,000원(5%지급) 이 책은 스마트폰 활용 교육 전문가인 저자가 스마트폰 교육 현장에서 알게 된 중·장년, 고령층 수강생들의 심리적, 정서적, 인지적, 신체적 특징을 고려하여 집필한 스마트폰 기초 교육 교재입니다. 다년간 스마트 Source: [도서] 쉽게 따라하는 스마트폰 기초 교재