Niranjan Gblog.securityinsights.io·Aug 4, 2024Managing CVE Data Locally with CVE Database ManagerIntroduction In the cybersecurity landscape, keeping track of vulnerabilities is crucial for maintaining secure systems. The Common Vulnerabilities and Exposures (CVE) list is a comprehensive catalog of such vulnerabilities. However, using public API...1 like·124 readsCVE Database
La Rebelion Labsrebelion.la·Jul 12, 2024How to Install Kubernetes in Airgapped Environments (Without a Container Runtime!)Air-gapped environments and zero-trust networks are becoming essential in finance, health, and telecommunications sectors. These security measures ensure data integrity and protect against cyber threats. One of my blog posts on installing Kubernetes ...93 readsK1sKubernetes
La Rebelion Labsrebelion.la·May 21, 2024Mastering CICD in Enterprise and Air-Gapped EnvironmentsImagine a world where your software deployment is seamless, bugs are a rarity, and your team is more productive than ever. Sounds like a dream, right? This is the promise of Continuous Integration and Continuous Deployment (CICD). Yet, in the labyrin...153 readsair-gapped
Joseph Ganbwgjoseph.com·Feb 18, 2023Prefer Docker save and loadover Docker export and import. This serves as a reminder for me as I often mixed up myself. Save vs Export As per documentation, save produces a tar file that contains all parent layers, and all tags + versions, or specified repo:tag, for each argum...317 readsDocker