Analyzing HTTP/HTTPS Traffic with StratosharkUnderstanding System Calls: The Key to Cloud-Native Security and Observability6d ago6d ago
Confessions of a HackerBridging the Gap Between Security, Development, and OperationsDec 16, 2024Dec 16, 2024
Ollama Tool Support and Call Interception Using MITM ProxyEnhance Your AI Models with Ollama Tool Support and API Call Interception Using MITM Proxy — A Step-by-Step Guide”Aug 9, 2024Aug 9, 2024
Bridging Boundaries: Building a Multi-Region Cilium Clustermesh with FortiGate VPN in AWSIntroductionMar 7, 2024Mar 7, 2024
Running the Phi-2 on Ollama !Large Language Models (LLMs) are fascinating, and their benefits are obvious and well discussed all over the internet. However, it’s also…Dec 23, 2023Dec 23, 2023
Enhancing Security in DevSecOps and Kubernetes: Best Practices for Navigating the Threat LandscapeIn the domain of software development, the concept of DevSecOps — melding security with DevOps practices — is a transformative approach to…Nov 9, 2023Nov 9, 2023
Running IPv6 containers on DigitalOceanCreate a droplet (ex. Ubuntu) and in the advanced section click “Enable IPv6 (free)”. Don’t forget the select a SSH key for remote access…Oct 9, 2023Oct 9, 2023