article thumbnail

A Gentle Intro to eBPF

DZone

TLDR eBPF is a mechanism that makes the kernel dynamically programmable without modifying the source code. eBPF has been running in production for over half a decade at an internet scale on millions of servers. eBPF is safe, fast, incredibly flexible, and extensible.

Internet 195
article thumbnail

Application vulnerabilities: Important lessons from the OWASP top 10 about application security risks

Dynatrace

This method involves providing the lowest level of access by default, deleting inactive accounts, and auditing server activity. For example, ensuring software stacks don’t use default accounts or passwords, error handling doesn’t reveal sensitive information, and application server frameworks use secure settings.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What is Log4Shell? The Log4Shell vulnerability explained (and what to do about it)

Dynatrace

Since December 10, days after a critical vulnerability known as Log4Shell was discovered in servers supporting the game Minecraft, millions of exploit attempts have been made of the Log4j 2 Java library, according to one team tracking the impact, with potential threat to millions more applications and devices across the globe. Dynatrace news.

Internet 262
article thumbnail

Log4j 2 Vulnerability: Identifying and Minimizing Production Risk

Dynatrace

It results in remote code execution (RCE) by submitting a specially composed request. This means that an attacker with control over a string that gets passed to the log4j 2 logger can trick the application into requesting a resource from a server under the attacker’s control, then load it, and then execute it. Sensitive Data Access.

Java 242
article thumbnail

Improving JavaScript Bundle Performance With Code-Splitting

Smashing Magazine

Improving JavaScript Bundle Performance With Code-Splitting. Improving JavaScript Bundle Performance With Code-Splitting. It’s a common misconception that the code which is produced by the framework build tools (Webpack, for example) is fully optimized and cannot be improved upon any further. The answer lies in code-splitting.

Code 89
article thumbnail

Why open source software and open standards are crucial to the future of software development

Dynatrace

From common coding libraries to orchestrating container-based computing, organizations now rely on open source software—and the open standards that define them—for essential functions throughout their software stack. Above all, when developers use code that others have developed and vetted it saves time and money.

article thumbnail

Log4Shell vulnerability: Identifying and minimizing production risk

Dynatrace

It results in remote code execution (RCE) by submitting a specially composed request. This means that an attacker with control over a string that gets passed to the log4j 2 logger can trick the application into requesting a resource from a server under the attacker’s control, then load it, and then execute it. Sensitive Data Access.

Java 189