<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 17 Apr 2026 05:49:55 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Kvm”</title>
    <link>https://techsnap.systems/tags/kvm</link>
    <pubDate>Fri, 26 Jul 2019 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>408: Apollo's ARC</title>
  <link>https://techsnap.systems/408</link>
  <guid isPermaLink="false">2577b50c-e740-46c8-a75b-14f074cb812a</guid>
  <pubDate>Fri, 26 Jul 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2577b50c-e740-46c8-a75b-14f074cb812a.mp3" length="25365234" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC.</itunes:subtitle>
  <itunes:duration>35:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC. 
Plus an update on ZoL SIMD acceleration, your feedback, and an interesting new neuromorphic system from Intel. 
</description>
  <itunes:keywords>virtualization, openzfs, zfs, kvm, qemu, vhd, qcow, qcow2, ARC, memory, page cache, caching, ZFS on Linux, ZoL, SIMD, floating point, fpu, apollo, apollo anniversary, nasa, retro computing, magnetic core, core rope, AGC, apollo guidance computer, intel, dancing demon, kernel module, loihi, neuromorphic computing, text adventure, punch cards, Margaret Hamilton, neural networks, machine learning, ai, pohoiki, snapshots, sysadmin, trs-80, cloud, Chris Siebenmann,  DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC. </p>

<p>Plus an update on ZoL SIMD acceleration, your feedback, and an interesting new neuromorphic system from Intel.</p><p>Links:</p><ul><li><a title="ZFS On Linux Has Figured Out A Way To Restore SIMD Support On Linux 5.0+" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-Restoring-SIMD">ZFS On Linux Has Figured Out A Way To Restore SIMD Support On Linux 5.0+</a> &mdash; Those running ZFS On Linux (ZoL) on post-5.0 (and pre-5.0 supported LTS releases) have seen big performance hits to the ZFS encryption performance in particular. That came due to upstream breaking an interface used by ZFS On Linux and admittedly not caring about ZoL due to it being an out-of-tree user. But now several kernel releases later, a workaround has been devised. </li><li><a title="ZFS On Linux Runs Into A Snag With Linux 5.0" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-5.0-Problem">ZFS On Linux Runs Into A Snag With Linux 5.0</a></li><li><a title="NixOS Takes Action After 1.2GB/s ZFS Encryption Speed Drops To 200MB/s With Linux 5.0+" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NixOS-Linux-5.0-ZFS-FPU-Drop">NixOS Takes Action After 1.2GB/s ZFS Encryption Speed Drops To 200MB/s With Linux 5.0+</a> &mdash;  A NixOS developer reports that the functions no longer exported by Linux 5.0+ and previously used by ZoL for AVX/AES-NI support end up dropping the ZFS data-set encryption performance to 200MB/s where as pre-5.0 kernels ran around 1.2GB/s</li><li><a title="Linux 5.0 compat: SIMD compatibility · zfsonlinux/zfs@e5db313" rel="nofollow" href="https://github.com/zfsonlinux/zfs/commit/e5db31349484e5e859c7a942eb15b98d68ce5b4d">Linux 5.0 compat: SIMD compatibility · zfsonlinux/zfs@e5db313</a> &mdash; Restore the SIMD optimization for 4.19.38 LTS, 4.14.120 LTS,
and 5.0 and newer kernels.  This is accomplished by leveraging
the fact that by definition dedicated kernel threads never need
to concern themselves with saving and restoring the user FPU state.
Therefore, they may use the FPU as long as we can guarantee user
tasks always restore their FPU state before context switching back
to user space.</li><li><a title="no SIMD acceleration · Issue #8793 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/8793">no SIMD acceleration · Issue #8793 · zfsonlinux/zfs</a> &mdash; 4.14.x, 4.19.x, 5.x all have no SIMD acceleration, it is like a turtle. very slow.

</li><li><a title="Chris&#39;s Wiki :: ZFS on Linux still has annoying issues with ARC size" rel="nofollow" href="https://utcc.utoronto.ca/~cks/space/blog/linux/ZFSOnLinuxARCShrinkage">Chris's Wiki :: ZFS on Linux still has annoying issues with ARC size</a> &mdash; One of the frustrating things about operating ZFS on Linux is that the ARC size is critical but ZFS's auto-tuning of it is opaque and apparently prone to malfunctions, where your ARC will mysteriously shrink drastically and then stick there.
</li><li><a title="Software woven into wire, Core rope and the Apollo Guidance Computer" rel="nofollow" href="http://www.righto.com/2019/07/software-woven-into-wire-core-rope-and.html">Software woven into wire, Core rope and the Apollo Guidance Computer</a> &mdash; One of the first computers to use integrated circuits, the Apollo Guidance Computer was lightweight enough and small enough to fly in space. An unusual feature that contributed to its small size was core rope memory, a technique of physically weaving software into high-density storage.</li><li><a title="Virtual Apollo Guidance Computer (AGC) software" rel="nofollow" href="https://github.com/virtualagc/virtualagc">Virtual Apollo Guidance Computer (AGC) software</a> &mdash; Since you are looking at this README file, you are in the "master" branch of the repository, which contains source-code transcriptions of the original Project Apollo software for the Apollo Guidance Computer (AGC) and Abort Guidance System (AGS), as well as our software for emulating the AGC, AGS, and some of their peripheral devices (such as the display-keyboard unit, or DSKY).</li><li><a title="The Underappreciated Power of the Apollo Computer - The Atlantic" rel="nofollow" href="https://www.theatlantic.com/science/archive/2019/07/underappreciated-power-apollo-computer/594121/">The Underappreciated Power of the Apollo Computer - The Atlantic</a> &mdash; Without the computers on board the Apollo spacecraft, there would have been no moon landing, no triumphant first step, no high-water mark for human space travel. A pilot could never have navigated the way to the moon, as if a spaceship were simply a more powerful airplane. The calculations required to make in-flight adjustments and the complexity of the thrust controls outstripped human capacities.</li><li><a title="Brains scale better than CPUs. So Intel is building brains | Ars Technica" rel="nofollow" href="https://arstechnica.com/science/2019/07/brains-scale-better-than-cpus-so-intel-is-building-brains/">Brains scale better than CPUs. So Intel is building brains | Ars Technica</a> &mdash; Neuromorphic engineering—building machines that mimic the function of organic brains in hardware as well as software—is becoming more and more prominent. The field has progressed rapidly, from conceptual beginnings in the late 1980s to experimental field programmable neural arrays in 2006, early memristor-powered device proposals in 2012, IBM's TrueNorth NPU in 2014, and Intel's Loihi neuromorphic processor in 2017. Yesterday, Intel broke a little more new ground with the debut of a larger-scale neuromorphic system, Pohoiki Beach, which integrates 64 of its Loihi chips.
</li><li><a title="Dancing Demon - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=6CCJFQ_bP0E">Dancing Demon - YouTube</a> &mdash; Written in 1979 by Leo Christopherson for the Radio Shack TRS-80 Model I computer. This is the best game ever for at that time.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC. </p>

<p>Plus an update on ZoL SIMD acceleration, your feedback, and an interesting new neuromorphic system from Intel.</p><p>Links:</p><ul><li><a title="ZFS On Linux Has Figured Out A Way To Restore SIMD Support On Linux 5.0+" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-Restoring-SIMD">ZFS On Linux Has Figured Out A Way To Restore SIMD Support On Linux 5.0+</a> &mdash; Those running ZFS On Linux (ZoL) on post-5.0 (and pre-5.0 supported LTS releases) have seen big performance hits to the ZFS encryption performance in particular. That came due to upstream breaking an interface used by ZFS On Linux and admittedly not caring about ZoL due to it being an out-of-tree user. But now several kernel releases later, a workaround has been devised. </li><li><a title="ZFS On Linux Runs Into A Snag With Linux 5.0" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-5.0-Problem">ZFS On Linux Runs Into A Snag With Linux 5.0</a></li><li><a title="NixOS Takes Action After 1.2GB/s ZFS Encryption Speed Drops To 200MB/s With Linux 5.0+" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NixOS-Linux-5.0-ZFS-FPU-Drop">NixOS Takes Action After 1.2GB/s ZFS Encryption Speed Drops To 200MB/s With Linux 5.0+</a> &mdash;  A NixOS developer reports that the functions no longer exported by Linux 5.0+ and previously used by ZoL for AVX/AES-NI support end up dropping the ZFS data-set encryption performance to 200MB/s where as pre-5.0 kernels ran around 1.2GB/s</li><li><a title="Linux 5.0 compat: SIMD compatibility · zfsonlinux/zfs@e5db313" rel="nofollow" href="https://github.com/zfsonlinux/zfs/commit/e5db31349484e5e859c7a942eb15b98d68ce5b4d">Linux 5.0 compat: SIMD compatibility · zfsonlinux/zfs@e5db313</a> &mdash; Restore the SIMD optimization for 4.19.38 LTS, 4.14.120 LTS,
and 5.0 and newer kernels.  This is accomplished by leveraging
the fact that by definition dedicated kernel threads never need
to concern themselves with saving and restoring the user FPU state.
Therefore, they may use the FPU as long as we can guarantee user
tasks always restore their FPU state before context switching back
to user space.</li><li><a title="no SIMD acceleration · Issue #8793 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/8793">no SIMD acceleration · Issue #8793 · zfsonlinux/zfs</a> &mdash; 4.14.x, 4.19.x, 5.x all have no SIMD acceleration, it is like a turtle. very slow.

</li><li><a title="Chris&#39;s Wiki :: ZFS on Linux still has annoying issues with ARC size" rel="nofollow" href="https://utcc.utoronto.ca/~cks/space/blog/linux/ZFSOnLinuxARCShrinkage">Chris's Wiki :: ZFS on Linux still has annoying issues with ARC size</a> &mdash; One of the frustrating things about operating ZFS on Linux is that the ARC size is critical but ZFS's auto-tuning of it is opaque and apparently prone to malfunctions, where your ARC will mysteriously shrink drastically and then stick there.
</li><li><a title="Software woven into wire, Core rope and the Apollo Guidance Computer" rel="nofollow" href="http://www.righto.com/2019/07/software-woven-into-wire-core-rope-and.html">Software woven into wire, Core rope and the Apollo Guidance Computer</a> &mdash; One of the first computers to use integrated circuits, the Apollo Guidance Computer was lightweight enough and small enough to fly in space. An unusual feature that contributed to its small size was core rope memory, a technique of physically weaving software into high-density storage.</li><li><a title="Virtual Apollo Guidance Computer (AGC) software" rel="nofollow" href="https://github.com/virtualagc/virtualagc">Virtual Apollo Guidance Computer (AGC) software</a> &mdash; Since you are looking at this README file, you are in the "master" branch of the repository, which contains source-code transcriptions of the original Project Apollo software for the Apollo Guidance Computer (AGC) and Abort Guidance System (AGS), as well as our software for emulating the AGC, AGS, and some of their peripheral devices (such as the display-keyboard unit, or DSKY).</li><li><a title="The Underappreciated Power of the Apollo Computer - The Atlantic" rel="nofollow" href="https://www.theatlantic.com/science/archive/2019/07/underappreciated-power-apollo-computer/594121/">The Underappreciated Power of the Apollo Computer - The Atlantic</a> &mdash; Without the computers on board the Apollo spacecraft, there would have been no moon landing, no triumphant first step, no high-water mark for human space travel. A pilot could never have navigated the way to the moon, as if a spaceship were simply a more powerful airplane. The calculations required to make in-flight adjustments and the complexity of the thrust controls outstripped human capacities.</li><li><a title="Brains scale better than CPUs. So Intel is building brains | Ars Technica" rel="nofollow" href="https://arstechnica.com/science/2019/07/brains-scale-better-than-cpus-so-intel-is-building-brains/">Brains scale better than CPUs. So Intel is building brains | Ars Technica</a> &mdash; Neuromorphic engineering—building machines that mimic the function of organic brains in hardware as well as software—is becoming more and more prominent. The field has progressed rapidly, from conceptual beginnings in the late 1980s to experimental field programmable neural arrays in 2006, early memristor-powered device proposals in 2012, IBM's TrueNorth NPU in 2014, and Intel's Loihi neuromorphic processor in 2017. Yesterday, Intel broke a little more new ground with the debut of a larger-scale neuromorphic system, Pohoiki Beach, which integrates 64 of its Loihi chips.
</li><li><a title="Dancing Demon - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=6CCJFQ_bP0E">Dancing Demon - YouTube</a> &mdash; Written in 1979 by Leo Christopherson for the Radio Shack TRS-80 Model I computer. This is the best game ever for at that time.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 391: Firecracker Fundamentals</title>
  <link>https://techsnap.systems/391</link>
  <guid isPermaLink="false">85bdbb45-28a2-4d50-bed1-ade6768e3fa3</guid>
  <pubDate>Thu, 29 Nov 2018 14:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/85bdbb45-28a2-4d50-bed1-ade6768e3fa3.mp3" length="18175107" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different than the options on the market now.</itunes:subtitle>
  <itunes:duration>21:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.
Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.
</description>
  <itunes:keywords>Firecracker, AWS, Amazon, Serverless, Lambda, Fargate, QEMU, KVM, Virtualization, Virtual Machines, VENOM, Rust,  BGP, OpenBSD, RPKI, MITM, dive, Docker, evilginx2, proxy, Sennheiser, TLS, SSL, OpenBGPD, RIPE, LSI, RAID, Allan Jude, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
