Metta Surendharmettasurendhar.hashnode.dev·Aug 27, 2024Rootless Containers: What They Are and Why You Should Use ThemRunning containers with root privileges has long been recognized as a security risk. When a container operates with root access, it potentially exposes the host system to severe vulnerabilities. If that container is compromised, an attacker could gai...rootless
Metta Surendharmettasurendhar.hashnode.dev·Aug 20, 2024The Evolution and Power of Containers: From FreeBSD Jail to Docker and BeyondIntroduction The world of software development has changed a lot in the past decade, mainly because of container technology. What started as a small solution for isolating processes is now a key part of how we develop and deploy apps. From the early ...podman container