If you’ve got a Proxmox Server, you’ll know how awesome it is to run everything as (LXC) Containers, they’re light & resource-efficient, easier to manage and can be templated. But often, you start off with a VM, set it up the way you want and have no way of easily converting. Now you can, quite easily!
Explore using TinyGo for your IoT adventures on Arduino. Setting up - tooling, terminal goodies, VSCode with uploading your first sketch and some interesting bits about TinyGo in the new v0.15.x release.
Simple guide to help you get started with Windows Terminal and work around some common problems, configure it to look schmick and improve your productivity too! Including my Windows Terminal profile with elevated terminal sessions in process!
Here’s a quick tip if you want to browse the files in your GAC easily without messing about with commands all the time. Map the folder containing the assemblies with the Subst command.
To do that, bring up a console window (⊞ Win + R ), then:
subst G: C:\windows\Assembly This will map the Global Assembly Cache folder to your G drive in Windows Explorer.
... ➦
I’ve been busy hacking away the past month or so with Windows Phone 7 and Android. They’re both very different when it comes to the out of box developer experience – with Microsoft tools being supremo right now. Thought I’d contribute some resources when it comes to (on this post) writing Windows Phone 7 Applications.
... ➦
If the Linux CVE-2010-3081: 64bit Linux Kernel Root Exploit didn’t get you, then this little birdy might. It seems the implementation of the AES encryption algorithm which protects the integrity of the Session Cookies in ASP.NET has a weakness which could enable an attacker to hijack sessions – Which bank? The idea behind the use of AES is to ensure that the crypt’d data hasn’t been tampered with – and hence decryptable, but unfortunately the flawed implementation of the use of AES and how it handles errors gives out some much needed clues for an attacker to pursue.
... ➦
Well its been a heavy week on the security front, first up is a Linux root exploit for 64bit Machines.
A vulnerability in the 32-bit compatibility layer for 64-bit systems was reported. It is caused by insecure allocation of user space memory when translating system call inputs to 64-bit. A stack pointer underflow can occur when using the “compat_alloc_user_space” method with an arbitrary length input.
... ➦