white2hack 📚 – Telegram
white2hack 📚
13.3K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Kubernetes Best Practices by MS Azure Cloud

This guide gives recommendations around multi-tenancy, security, network and storage, and running enterprise-ready workloads. It is aimed at developers and application owners who are familiar with Kubernetes and have a good understanding of Azure Kubernetes Service (AKS) core concepts. The following best practices are based on real-world deployments of Kubernetes that we have gathered directly from our experience in the field.

#SecDevOps
👍3
Kubernetes Best Practices by MS Azure Cloud.pdf
2.4 MB
Kubernetes Best Practices by MS Azure Cloud
👍3
This media is not supported in your browser
VIEW IN TELEGRAM
8 Main Docker Commands everyone should know about with animation

🔹 create Dockerfile - Craft custom images like a pro 📄🔨
🔹 docker build - Build images effortlessly 🏗
🔹 docker push - Share your images like a champ 🚀🌐
🔹 docker rmi - Delete image with ease 🗑
🔹 docker run - Launch containers like a breeze 🏃‍♂️
🔹 docker pull - Access ready-to-use images instantly ⬇️
🔹 docker stop - Gracefully say goodbye to running containers 🛑
🔹 docker rm - Delete containers with ease 🗑

#SecDevOps
👍4🔥2
Сетевой юмор😀

#fun
😁21👍1
The Coming AI Hackers by Bruce Schneier, 2021

n this essay, I will talk about the implications of AI hackers. First, I will generalize “hacking” to include economic, social, and political systems—and also our brains. Next, I will describe how AI systems will be used to hack us. Then, I will explain how AIs will hack the economic, social, and political systems that comprise society. Finally, I will discuss the implications of a world of AI hackers, and point towards possible defenses. It’s not all as bleak as it might sound.

Source

#book
👍4
The Coming AI Hackers.pdf
7.3 MB
The Coming AI Hackers by Bruce Schneier, 2021
👍3
Web Pentest via CompTIA Pentest+ (PT0-002) Guide

#web #book
🔥3
Web Pentest via CompTIA Pentest+ (PT0-002) Guide.pdf
16.1 MB
Web Pentest via CompTIA Pentest+ (PT0-002) Guide
👍4
Threat Hunting 101

8 Threat Hunts You Can Do with Available Resources

In this white paper, we will discuss the minimum toolset and data requirements you need for successful threat hunting. We will take into account that, while some readers can devote most of their time to threat hunting, like most, you have limited time and resources for this activity. The good news is that threat hunting is flexible, and anyone can do it, regardless if you are spending just a few hours a week to full time.

#book
👍3
Becoming a DevOps Engineer RoadMap

This comprehensive roadmap covers most of the essential skills, tools, and concepts you'll need to become a professional DevOps Engineer.

Remember, DevOps is an evolving field, so continuous learning and hands-on experience with real-world projects will be invaluable

#DevSecOps
🔥3
Becoming a DevOps Engineer RoadMap.pdf
267.4 KB
Becoming a DevOps Engineer RoadMap
👍2