Metta Surendharmettasurendhar.hashnode.dev·Aug 27, 2024Rootless Containers: What They Are and Why You Should Use ThemRunning containers with root privileges has long been recognized as a security risk. When a container operates with root access, it potentially exposes the host system to severe vulnerabilities. If that container is compromised, an attacker could gai...rootless
Metta Surendharmettasurendhar.hashnode.dev·Aug 20, 2024The Evolution and Power of Containers: From FreeBSD Jail to Docker and BeyondIntroduction The world of software development has changed a lot in the past decade, mainly because of container technology. What started as a small solution for isolating processes is now a key part of how we develop and deploy apps. From the early ...podman container
Metta Surendharmettasurendhar.hashnode.dev·Aug 13, 2024Exploring Podman and Beyond: Open Source Alternatives to Docker for Secure ContainerizationAttending the CNCF Chennai Meetup was an enlightening experience, particularly with the insightful talk by Ram, Chief Evangelist at the Cloud Foundry Foundation. His presentation, titled "Cloud Native Containers: Myth, Truth, or Marketing?," provided...45 readspodman
Mohamed Salahmosalah.cloud·Jun 7, 2024Podman: Daemonless to RootlessThe development and deployment of applications has been transformed by containerization. A daemon process is used by the well-known containerization technology Docker to manage containers. This daemon is useful, but it poses a security risk because i...1 like·67 readspodman, containers, docker