Showing entries 1 to 10 of 32
10 Older Entries »
Displaying posts with tag: Technology Tid Bits (reset)
Security For Web Applications Webinar: Wrap Up

Thank you for attending the Sun Startup Essentials webinar on Security for Web Applications, here is a list of useful links to learn more about and start implementing the different technologies that were covered during the presentation:

[Read more]
Security For Web Applications Webinar: Wrap Up

Thank you for attending the Sun Startup Essentials webinar on Security for Web Applications, here is a list of useful links to learn more about and start implementing the different technologies that were covered during the presentation:

[Read more]
Security For Web Applications Webinar: Wrap Up

Thank you for attending the Sun Startup Essentials webinar on Security for Web Applications, here is a list of useful links to learn more about and start implementing the different technologies that were covered during the presentation:

[Read more]
Reminder: Tech Webinar on Security for Web Application

Reminder, mark you callendar:

Wednesday January 27th, Join the Sun Startup Essentials Webinar on  Security for Web Applications.

A key success factor for Web startups is to protect their applications and data from different security threats. Join this webinar to learn about security challenges and about key solutions such as encryption, authentication, certificates, secure and fault-tolerant storage, chrooted environments. The Sun Startup Essentials experts will also cover how to implement these solutions at minimal cost by using standard and open components such as Solaris, Apache, MySQL, ZFS and more.

Registration limited to members of the Sun Startup Essentials program.

Your company is less than 6 year and  150 employee: Join Sun Startup Essentials >>


Reminder: Tech Webinar on Security for Web Application

Reminder, mark you callendar:

Wednesday January 27th, Join the Sun Startup Essentials Webinar on  Security for Web Applications.

A key success factor for Web startups is to protect their applications and data from different security threats. Join this webinar to learn about security challenges and about key solutions such as encryption, authentication, certificates, secure and fault-tolerant storage, chrooted environments. The Sun Startup Essentials experts will also cover how to implement these solutions at minimal cost by using standard and open components such as Solaris, Apache, MySQL, ZFS and more.

Registration limited to members of the Sun Startup Essentials program.

Your company is less than 6 year and  150 employee: Join Sun Startup Essentials >>


Reminder: Tech Webinar on Security for Web Application

Reminder, mark you callendar:

Wednesday January 27th, Join the Sun Startup Essentials Webinar on  Security for Web Applications.

A key success factor for Web startups is to protect their applications and data from different security threats. Join this webinar to learn about security challenges and about key solutions such as encryption, authentication, certificates, secure and fault-tolerant storage, chrooted environments. The Sun Startup Essentials experts will also cover how to implement these solutions at minimal cost by using standard and open components such as Solaris, Apache, MySQL, ZFS and more.

Registration limited to members of the Sun Startup Essentials program.

Your company is less than 6 year and  150 employee: Join Sun Startup Essentials >>


ZFS and Solaris: storage optimization for the cloud

Cloud computing has been one of the most discussed topic over the year, and the discussion is not over because what is really being discussed is the way we will access computing an storage resources in the future. Even famous French intellectuals are giving their opinion and making predictions. Future will decide on predictions's accuracy.

What is usually less discussed is the technology behind cloud-computing, though this is no secret that virtualization is playing a key role. Cloud data-centers will be loaded with virtual machines each of these machines potentially requiring in disk-space what a complete operating system (OS) requires, which can go up to many gigabytes. How much disk-space does a virtual machine image (vdi) really consum? The only good answer is: too much. Too much because the OS is part of the infrastructure as …

[Read more]
ZFS and Solaris: storage optimization for the cloud

Cloud computing has been one of the most discussed topic over the year, and the discussion is not over because what is really being discussed is the way we will access computing an storage resources in the future. Even famous French intellectuals are giving their opinion and making predictions. Future will decide on predictions's accuracy.

What is usually less discussed is the technology behind cloud-computing, though this is no secret that virtualization is playing a key role. Cloud data-centers will be loaded with virtual machines each of these machines potentially requiring in disk-space what a complete operating system (OS) requires, which can go up to many gigabytes. How much disk-space does a virtual machine image (vdi) really consum? The only good answer is: too much. Too much because the OS is part of the infrastructure as …

[Read more]
ZFS and Solaris: storage optimization for the cloud

Cloud computing has been one of the most discussed topic over the year, and the discussion is not over because what is really being discussed is the way we will access computing an storage resources in the future. Even famous French intellectuals are giving their opinion and making predictions. Future will decide on predictions's accuracy.

What is usually less discussed is the technology behind cloud-computing, though this is no secret that virtualization is playing a key role. Cloud data-centers will be loaded with virtual machines each of these machines potentially requiring in disk-space what a complete operating system (OS) requires, which can go up to many gigabytes. How much disk-space does a virtual machine image (vdi) really consum? The only good answer is: too much. Too much because the OS is part of the infrastructure as …

[Read more]
HowTo: Using Virtualization to Secure MySQL in a Chrooted Environment

Chrooted environments are known to greatly improve system and application security by providing them with a higher degree of isolation. The objective is to separate as much as possible from other executables and resources the runtime environment of an application so that if a hacker get access to it,the rest of the system is not compromised. This technic is commonly used with MySQL.

Traditionally, the chrooting applies at the file system level, by creating a separated and minimal operating system disk-image.  The operation consists in creating a set of directories (such a /chroot/etc, /chroot/tmp, /chroot/var/tmp, /chroot/usr/local/mysql etc.) and duplicate a minimal number of binary and configuration files into this new directory tree. After setting the right permissions on the new directories, the chrootuid utility is used to execute the application in the restricted environment. …

[Read more]
Showing entries 1 to 10 of 32
10 Older Entries »