In previous Foray into Jenkins, Puppet, Docker, and Photon posts, I was able to clone a Photon OS VM (part 1), deploy a Docker container into the Photon OS VM (part 2), and do automated load testing (part 3). Now it is time to look at improving the security of my Git repository. Given the number of scripts out there to look through GitHub for API keys, usernames, and passwords in order to rack up serious bills on Amazon and other cloud services, it behooves us to be extra vigilant.
In previous Foray into Jenkins, Puppet, Docker, and Photon posts, I was able to clone a Photon OS VM (part 1) and deploy a Docker container into the Photon OS VM (part 2). Now, it is time to do some automated load testing in order to load and security test the deployed application. Load testing is required to determine the upper limit of the load this one container can handle. Once I know that, I can properly scale out the environment. But I also need to ensure that known security holes do not exist. Continue reading Foray into Jenkins, Docker, and Photon: Part 3
There are a number of interesting attacks out there, and one of them is related to Genericons, which are used by the Twenty Fourteen theme. There are also serious performance issues with Genericons, so dumping them is a good idea. Here is how I did that without using a child theme. My whole goal for using Twenty Fourteen was to modify it without using a child theme. Not that hard to do, but it does take some forethought. Here is how I achieved this bit of magic and boosted performance at the same time!
In WordPress Hacked: Security Steps Take II, I wrote about the tools and steps to take to secure your WordPress installation. The current steps to take are the same. The tools, however, have changed significantly. Even as the steps changed from WordPress Hacked: Security Steps, now we look at the tools once more. I will reiterate the steps at the end of the post for completeness. However, let us begin by examining the tools. I have removed quite a few from my installs that I had previously recommended, and I will explain why below. Continue reading WordPress Hacked: Security Steps and Cleanup Take III
I have written about upgrading VMware vCenter Log Insight (vLI) in the past, but I have not discussed my first content pak for Log Insight. You can find my discussion on how to set up this content pak below. This was recorded at VMworld 2014 by the vBrownBag folks. I would like to thank them for their effort and for allowing me to speak on this subject. Continue reading vSphere Upgrade Saga: Log Insight Content Pak
I’m tired of moving spam mail to spam folders from which the system never learns. So it’s time for me to try a new approach.