jackbezalel.net
Why DevOps picks Ruby over Python | jackbezalel
https://jackbezalel.net/2015/06/17/why-devops-picks-ruby-over-python
IT Professional Reporting from the Trenches. Why DevOps picks Ruby over Python. This article is not staying that Ruby is better or not. It’s simply at the core of two massive automation leaders, Puppet and Chef. Http:/ devopsanywhere.blogspot.com/2011/09/how-ruby-is-beating-python-in-battle.html. June 17, 2015. Crazy Idea: Duolc, StretchOS and what Gazzilion Apps Really want [! OS X and iOS Unauthorized Cross Application Resource Access (XARA) →. Leave a Reply Cancel reply. Enter your comment here. AWS A...
jackbezalel.net
XARA | jackbezalel
https://jackbezalel.net/tag/xara
IT Professional Reporting from the Trenches. OS X and iOS Unauthorized Cross Application Resource Access (XARA). This is about rouge apps that preset the environment that other mass used apps will need once activated. Those rouge apps can later hook to those resources, having unauthorized access due to the fact they initiated the creation of the place holder for those resources. The iOS sandbox protection mechanism can’t yet block this vulnerability. This entry was posted in Security. June 18, 2015.
jackbezalel.net
Disaster Recovery in just $200? Watch this “On-Premise DR, assisted by Amazon AWS” session | jackbezalel
https://jackbezalel.net/2015/06/30/disaster-recovery-on-premise-dr-assisted-by-amazon-aws
IT Professional Reporting from the Trenches. Disaster Recovery in just $200? Watch this “On-Premise DR, assisted by Amazon AWS” session. I think this one is a “Watch ASAP” for Enterprise IT Professionals who are looking for ways to cut on the time and effort spent on their On-Premise DR (Disaster Recovery) project,. And are open to use Amazon AWS for that purpose. This entry was posted in Strategy and IT (Information Technology). And tagged Amazon AWS. June 30, 2015. Leave a Reply Cancel reply. You are c...
jackbezalel.net
Vulnerability | jackbezalel
https://jackbezalel.net/tag/vulnerability
IT Professional Reporting from the Trenches. OS X and iOS Unauthorized Cross Application Resource Access (XARA). This is about rouge apps that preset the environment that other mass used apps will need once activated. Those rouge apps can later hook to those resources, having unauthorized access due to the fact they initiated the creation of the place holder for those resources. The iOS sandbox protection mechanism can’t yet block this vulnerability. This entry was posted in Security. June 18, 2015.
jackbezalel.net
Farewell my friend (@CA) and the source for Success and Happiness | jackbezalel
https://jackbezalel.net/farewell-ca-and-the-secret-of-success-and-happiness
IT Professional Reporting from the Trenches. Farewell my friend (@CA) and the source for Success and Happiness. Glad you got here! Let me start with a story first. I am sharing it with you, because the message I want to convey to you is that. The essence of success and happiness boils down to one question:. 8220; Are you proud of what you have done so far? Look into your heart, and ask this question, you will quickly. I am leaving CA to join the #1 company in Israel,. The leader in Amazon, Google and oth...
jackbezalel.net
Security | jackbezalel
https://jackbezalel.net/tag/security
IT Professional Reporting from the Trenches. Open Source Security Validation Plug-in [Cool! WhiteSource’s New Selection Tool Helps Developers Choose Better Open Source Components. July 10, 2016. OS X and iOS Unauthorized Cross Application Resource Access (XARA). The iOS sandbox protection mechanism can’t yet block this vulnerability. This becomes very unsettling if you consider your iOS and OSx keychain password store can be exposed as well…. This entry was posted in Security. June 18, 2015. June 11, 2015.
jackbezalel.net
OS X and iOS Unauthorized Cross Application Resource Access (XARA) | jackbezalel
https://jackbezalel.net/2015/06/18/os-x-and-ios-unauthorized-cross-application-resource-access-xara
IT Professional Reporting from the Trenches. OS X and iOS Unauthorized Cross Application Resource Access (XARA). This is about rouge apps that preset the environment that other mass used apps will need once activated. Those rouge apps can later hook to those resources, having unauthorized access due to the fact they initiated the creation of the place holder for those resources. The iOS sandbox protection mechanism can’t yet block this vulnerability. This entry was posted in Security. June 18, 2015.
jackbezalel.net
StretchOS | jackbezalel
https://jackbezalel.net/tag/stretchos
IT Professional Reporting from the Trenches. Crazy Idea: Duolc, StretchOS and what Gazzilion Apps Really want [! Yes, I am a DevOps, Big Data, Security kind of guy and I use Amazon AWS, Microsoft Azure and OpenStack, as well as other smaller players. But I like to take a new diverse, contrarian look at stuff the Cloud community seem to have kind of pre-determined agreement. What the “Legacy” applications want is “Duolc”. 8220;Cloud” spelled in reverse) deployed on “StretchOS”. I am not aware of someone d...
jackbezalel.net
Security | jackbezalel
https://jackbezalel.net/category/security
IT Professional Reporting from the Trenches. Open Source Security Validation Plug-in [Cool! WhiteSource’s New Selection Tool Helps Developers Choose Better Open Source Components. July 10, 2016. OS X and iOS Unauthorized Cross Application Resource Access (XARA). The iOS sandbox protection mechanism can’t yet block this vulnerability. This becomes very unsettling if you consider your iOS and OSx keychain password store can be exposed as well…. This entry was posted in Security. June 18, 2015. June 11, 2015.