Weekly newsletter with curated articles about DevOps.
This week, we bring to you a presentation from Josh Schwartz about real tactics to compromise and backdoor secure products by exploiting the humans and systems that create them.
On Articles, a preview of Linux containers on Windows with InfraKit, Antifragility and how it differs from Resilence, monitor your Raspberry Pi cluster with Prometheus and Docker, how to have Per-IP rate limiting with iptables and a walkthrough guide about Cassandra.
Please, send us links, events, DevOps job-related, etc., via @devopsweeknews.
Video of the week
How to Backdoor Invulnerable Code - YouTube
Josh Schwartz takes a look at the real tactics, with examples, used to compromise and backdoor seemingly secure products by exploiting the humans and systems that create them.