#VSCode – How to install #docker in a #RaspberryPi 4

El Bruno


In my
series of posts on how to create a development environment using a Raspberry
Pi4, today is time to write about installing Docker. (see references)

I was user
to download and build docker to be used on the device, however now we have an easier
way to do this. Thanks to http://get.docker.com
we can now install docker with a single command

curl -sSL
https://get.docker.com | sh

And then, a simple check for the docker version

raspberry pi docker version in terminal


Greetings @

El Bruno


View original post

Crime Scene Investigation of GPS Data in Unmanned Aerial Vehicles (UAVs)

Forensic Focus - Articles

by Chirath De Alwis

The invention of the Unmanned Aerial Vehicle (UAV), also known as the drone, has the potential to address some crucial issues in society. Commercial aerial surveillance, oil/gas/mineral exploration, and disaster relief are some of them [1]. Considering the increasingly popular use of drones, it is evident that there is potential for them to be used in crimes. This demands forensics investigation.

When it comes to analysis of drone artifacts, GPS data plays a huge role. It is vital to answer to questions like where was this drone flying? From where this drone was sent? This article describes evidence acquisition from drones and extraction of GPS information from drone artifacts.

Drone Structure

To operate a drone requires the aircraft, a mobile device, battery, camera, radio controller, and/or Wi-Fi range extender (some models do connect using Wi-Fi). The structure of a drone can be vary based on the…

View original post 1,149 more words

7 Reasons Why You Should Learn Cyber Security

Simpliv LLC

In the present scenario, Cyber Security is becoming one of the finest options to begin your career with. The prime reason is the growing demand of the experts across the globe since last few years. It is one of the Information Technology domains which are becoming more and more challenging. Due to the rapidly increasing cyber attacks across the globe, organizations are looking for the experts who can help them in tackling the same. Another fact is cyber security is a challenging domain and needs a lot of expertise for the professionals in order to eliminate attacks that are unauthorized in nature. Well, these are not the only reason that why Cyber Security has come up with excellent scope in recent years. There are of course, several other reasons too. Here is the list of top 7 reasons why you should learn cyber security this year.

In the current scenario, Cyber Security…

View original post 1,510 more words

Survey Results: Workstations for Meshing

Another Fine Mesh

survey-checks-cropBack in May 2019 we surveyed the CFD and meshing communities about the computer workstations on which they currently run their mesh generation software and on their need for meshing software to be supported on HPC platforms. It has taken a while, but the results have been compiled, charted, and are presented here as promised.

View original post 931 more words

APFS, safe saves, inodes and the volfs file system

The Eclectic Light Company

Whether your Mac is booted from an APFS volume, or HFS+, and regardless of what storage is connected to it, there are other file systems you can use without so much as changing format. The most useful of these are based on a scheme in which each volume has a unique number, and every file and folder has another number unique to that volume – these are inodes in the volfs file system. Instead of a path such as /Users/me/Documents/bigDocs/thisOne.mov, you can instead refer to that file as /.vol/16777224/363940889.

Wherever you might move that item within the same volume, and however you might change its name, using that volfs path will always locate it.

Inodes and volfs paths aren’t intended for use in the GUI, and aren’t revealed in the Finder’s Get Info dialog, for instance. Unless you have very unusual ability, remembering two very large numbers isn’t a good…

View original post 205 more words

50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system

the morning paper

50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system Reardon et al., USENIX Security Symposium 2019

The problem is all inside your app, she said to me / The answer is easy if you take it logically / I’d like to help data in its struggle to be free / There must be fifty ways to leak their data.

You just slip it out the back, Jack / Make a new plan, Stan / You don’t need to be coy, Roy / Just get the data free.

Hop it on the bus, Gus / You don’t need to discuss much / Just drop off the key, Lee / And get the data free…

— Lyrics adapted from “50 ways to leave your lover” by Paul Simon (fabulous song btw., you should definitely check it out if you don’t already know it!).

View original post 1,186 more words

Running SQL Server containers as non-root

Recently I noticed that Microsoft uploaded a new dockerfile to the mssql-docker repository on Github. This dockerfile was under the mssql-server-linux-non-root directory and (you guessed it) allows SQL Server containers to run as non-root. But why is running a container as root bad? Let’s run through an example. Using a non-root user: – Run a […]

Running SQL Server containers as non-root — DBA From The Cold