Archive for the ‘DevOps’ Category
Posted by jpluimers on 2026/03/25
[WaybackSave/Archive] Automation can’t fix broken security basics – Help Net Security reveals nothing new: like in many places, automation isn’t the solution for bad processes or bad behaviour. Automation just assists getting things done (even in security), only marginally leading people to getting these things right in addition to done.
Leadership often focuses on broad resilience goals while the day-to-day work that supports them remains inconsistent and underfunded.
This is especially true when the day-to-day activities mainly consists clicking on links and other user-interface elements.
Yes, dark patterns are being used by adversaries, but a lot of day to day user experiences are based on dark patterns.
Improve those experiences by designing better processes amended by better automation, not the other way around.
Oh, and get your foundations right. For example by having processes in place that ease timely patching, even if that requires deployment on fridays.
--jeroen
Posted in Dark Pattern, Deployment, Development, DevOps, Infrastructure, Software Development, UI Design, User Experience (ux) | Leave a Comment »
Posted by jpluimers on 2025/12/03
Interesting: Buddy (software) – Wikipedia
Buddy (also known as Buddy.Works) is a web-based and self-hosted continuous integration and delivery software for Git developers that can be used to build, test and deploy web sites and applications with code from GitHub, Bitbucket and GitLab. It employs Docker containers with pre-installed languages and frameworks for builds, alongside DevOps, monitoring and notification actions.
On my list of things to try in case built-in GitGub and GitLab functionality does not suffice my needs any more.
I wonder how well it runs on ARM architecture.
–jeroen
Posted in Cloud, Containers, Continuous Integration, Development, DevOps, Docker, DVCS - Distributed Version Control, git, GitHub, GitLab, Infrastructure, Power User, Software Development | Leave a Comment »
Posted by jpluimers on 2025/11/19
[Wayback/Archive] Thread by @cyb3rops on Thread Reader App – Thread Reader App
If your agent gets flooded – detect the flooding.
If code gets obfuscated – detect the obfuscation.
If ETW gets silenced – detect the silence.
If the EDR gets killed – detect the killing.
If logs get cleared – detect the clearing.
The act of hiding is often more suspicious than what’s being hidden.
It’s like a surveillance camera going black or freezing.
That is the signal.
I’ve been doing this successfully for years.
I detect obfuscated crap all the time.
People ask, “What is it?”
I say, “No fucking clue. Could be:
– a Themida-packed sample with a Microsoft copyright,
– a UPX-packed ELF with a 1-char filename,
– a PowerShell script that looks like static noise, or
– a fake svchost.exe with no Microsoft copyright.”
I don’t need to know what it is.
It’s obviously shady.
That’s enough to detect it – and deal with it.
There’s a Chinese saying that fits perfectly: 欲蓋彌彰
The more you try to hide it, the more obvious it becomes.
--jeroen
Posted in Blue team, Development, DevOps, LifeHacker, Power User, Red team, Security, Software Development | Leave a Comment »
Posted by jpluimers on 2025/07/31
For my link archive [Wayback/Archive] Out of Control. An essay on paradigms, refactoring… | by Kevlin Henney | Dec, 2020 | Medium.
Neither because Kevlin describes how to refactor a basic algorithm to convert Roman numerals into Hindu-Arabic numerals (in part by using the fact that an if statement can be considered a bounded case of a while loop), nor because he splits the resulting algorithm in coded data and coded statements, or because he mentions the [Wayback/Archive] Gilded Rose Kata but because well, you should just read it in full.
Remember though: Read the rest of this entry »
Posted in Configuration Management, Development, DevOps, Power User, Python, Scripting, Software Development | Leave a Comment »
Posted by jpluimers on 2024/11/21
Still relevant: [Wayback/Archive] The Twelve-Factor App and [Wayback/Archive] 12 Fractured Apps — Medium
Once Docker hit the scene the benefits of the 12 Factor App (12FA) really started to shine. For example, 12FA recommends that logging should be done to stdout and be treated as an event stream. Ever run the docker logs command? That’s 12FA in action!
Via
–jeroen
Posted in Back-End Development, Cloud Development, Communications Development, Conference Topics, Conferences, Deployment, Developing scalable systems, Development, DevOps, Distributed Computing, Event, Software Development | Leave a Comment »
Posted by jpluimers on 2024/08/20
About a month from International CrowdStruck Day, just a few thoughts, more likely to follow:
- How well does your infrastructure behave when none of your Windows machines can boot?
- How well is your out-of-band management?
- How well is your CMDB doing key management, for instance for BitLocker encryption?
- Is checkbox compliance more important than a single point of failure?
- Can you ensure all updates from your supply chain are staggered/staged/phased with a kill switch when things get out of hand?
- Are the worst case scenarios in your disaster recovery plans really the worst?
- Do you understand the human factor of large scale outages (both of the people that – often indirectly – triggered them – hello #HupOps – and the ones that cannot work because of them)?
- Do you value your people – especially the ones that pulled you out of this situation – enough, and did you rename your Human Resource department into something that is more friendly to your people?
- Do you realise this could have happened on any of the platforms you use, including Linux and MacOS?
- If you were mentioned in the media by not recovering well, do you have any idea how much a target you will be from adversaries?
- Did CrowdStrike finally show some real postmortem instead of the half-hearted communications they did mostly after the weekend following the debacle?
- How does your organisation perform dates of critical files?
- Would other platforms be less or more risky? If so: why?
- Will eBPF solve most of this, or at least centralise the issues and what consequences would that have?
Read the rest of this entry »
Posted in Configuration Management, DevOps, HugOps, Infrastructure, Power User, Windows | Leave a Comment »
Posted by jpluimers on 2023/10/11
I had speedtest-cli running on MacOS and various Linux machines, but not yet on Windows (see for instance my post Ubuntu: Fixing the myserious “Failed to stop apt-daily.timer: Connection timed out”).
[Wayback/Archive] Install and Test Internet Speed with Speedtest CLI Command Line – NEXTOFWINDOWS.COM reminded me there is a Speedtest CLI for Windows download at at [Wayback/Archive] Speedtest CLI: Internet speed test for the command line, but I am a an automation/scripting/devops person, so luckily there are also [Wayback/Archive] Chocolatey Software | Speedtest by Ookla (don’t get [Wayback/Archive] Ookla.Speedtest download, as that is the GUI version).
Both the Chocolatey and winget packages are named the same, so that is quite confusing. This is how I have set them apart:
Read the rest of this entry »
Posted in *nix, *nix-tools, Batch-Files, Chocolatey, DevOps, GDPR/DS-GVO/AVG, Internet, ISP, KPN, Notepad++, Power User, Privacy, Scripting, SpeedTest, Windows, xs4all | 2 Comments »