#container

2026-01-27

Wittlich (ots) - Im Zeitraum 23.01.2026 bis 26.01.2026 begaben sich bisher unbekannte Täter zu einem Baustellencontainer einer Baustelle in der Kurfürstenstraße in Wittlich. Hier trennten sie mittels eines Winkelschleifers die Scharniere auf und ...

presseportal.de/blaulicht/pm/1

#Baustelle #Container #Einbruchsdiebstahl #Kurfürstenstraße #Täter

2026-01-26
#PhotoJanuary2026 #PhotoJanvier2026
J - 26 Thème / Theme / Tema : #Orange #Naranja
🇫🇷 Aujourd’hui, containers de chantier
🇬🇧 Today, construction site containers.
🇪🇸 Hoy, contenedores de obra.

#photography #photographie #fotografia #photo #foto #container #contenedore #chantier #construction #obra #rue #street #calle #Constructionwork #travaux
- Deux hauts de containers orange, en arrière plan des échafaudages de chantiers, et deux rubans orange qui pendent.
- Two orange container tops, with construction scaffolding in the background, and two orange ribbons hanging down.
- Dos partes superiores de contenedores naranjas, con andamios de obra al fondo y dos cintas naranjas colgando.

Ivan Fioravanti ᯅ (@ivanfioravanti)

Apple의 'container'(컨테이너 관련 도구/프로젝트)가 버전 0.8에 도달했다는 알림 트윗입니다. 작성자는 개선사항을 확인하기 위해 다시 테스트할 계획이라고 하며, 개발자용 컨테이너 툴의 업데이트 소식입니다.

x.com/ivanfioravanti/status/20

#apple #container #devtools #update

2026-01-23

No export button? Then we'll just build it ourselves. 🛠️

I spent two days “vibe-coding” with #cursor AI a fully functional backup tool for Harvest to back up our data every night for full data sovereignty.

In the past, too expensive – today, the #AI reads the #API documentation and gives me a ready #Docker #container.

This is important as #SaaS vendors don't care about our exit strategy or #backups. With #LLMs vendor #lockin is finally breaking down.

schlomo.schapiro.org/2026/01/n

#openSource

Illustration about Your Data, Your Rules: AI-Powered SaaS Backups
2026-01-22

Finally got the power envelope under 25 watts for the entire #homelab. This project took a few weeks in my spare time, but rising electricity costs finally pissed me off enough.

#selfhosted #virtualization #container #linux #opensource #utm #debian #macos #das #powerconsumption

Power meter showing 23.1 watts of power consumption at the wall socket.
2026-01-22

Yesterday I asked myself the question, why we don't distribute OCI images with a bittorrent(-like) protocol... and I think the answer is: Corporate didn't like it.

(Quay and dragonfly do have these capabilities but don't really use it for public images not to mention the lack of support in managers like containerd or podman.)

#kubernetes #container #torrent

Never thought I'd say this but #GitLab seems to be the better option for hosting a #Helm chart repository and a #Container registry than #GitHub... esp a private one. You could even do this from a single #Git repo (project) on GitLab, which also means you could even just create a single access token that is scoped to just this repo to have access to the hosted Helm charts and container images. Pretty nuts?

GitHub, otoh, I don't think you could even have a token that is as fine-grained scoped like this - to give access to a Helm chart (using the
#OCI package registry route) or a container image means to give access to ALL of them belonging to the user/org. Am I wrong? Anyway, I wonder how does other options like #Forgejo compare to these two. Big W for GitLab though.

2026-01-21

Germersheim (ots) - Bei der ersten Containerkontrolle der WSP-Station Germersheim im neuen Jahr, am heutigen Mittwoch den 21.01.2026, konnten einige Mängel in der Beförderung festgestellt werden. Von insgesamt 8 kontrollierten Containern waren 7 ...

presseportal.de/blaulicht/pm/1

#Container #Hafen #Ladungssicherung #PP #Transport

2026-01-21

I’ve been working on a modern implementation of a #DokuWiki #container image for my own use, and I thought it might be useful for others in the community.

There are several DokuWiki images out there, but I wanted something that was:

* Using Lighttpd instead of heavy Apache/Nginx setups.
* Based on the latest Ubuntu 24.04 (Noble) and latest stable DokuWiki.
* Fully supports both amd64 and arm64.

Repo: gitlab.com/pilasguru/dokuwiki

#containerimage #container #wiki #selfhosted

UserReviewcaglar07
2026-01-21

Brewing Up the Perfect Container: A Comprehensive Review

Introduction

<p>Coffee lovers, rejoice! Choosing the right coffee container can make all the difference in preserving the flavor and aroma of your favorite brew. But with so many options available, it can be overwhelming to decide on the perfect one.</p>
Pros and Cons

<p>In this review, w...

🔗 userreview.net/en/content/coff

UK Railway and Transport Newsukrailways@mastodon.london
2026-01-21

James Kemball becomes Felixstowe’s largest off-dock container storage provider dlvr.it/TQT7jj #Container #ContainerShipping #Felixstowe #JamesKemball

Vibewire Magazinevibewire@mastodon.au
2026-01-21

James Kemball becomes Felixstowe’s largest off-dock container storage provider dlvr.it/TQT7hx #Container #ContainerShipping #Felixstowe #JamesKemball

[Docker 베이스 이미지 이해하기: 컨테이너 속 Ubuntu는 진짜 Ubuntu가 아님

Docker 컨테이너의 아키텍처와 베이스 이미지에 대한 심층 분석. 컨테이너는 호스트 커널을 공유하며 사용자 공간 도구만 제공한다는 점을 강조. 컨테이너 vs 가상 머신의 차이, 베이스 이미지의 구성 요소, 메모리 사용 최적화, 호환성 문제 등을 설명.

news.hada.io/topic?id=25997

#docker #container #linux #virtualization #systemarchitecture

2026-01-20

:linux: New advanced Linux VoidLink Malware targets Cloud and Container Environments.

According to a new report from Check Point Research, the cloud-native Linux malware framework comprises an array of custom loaders, implants, rootkits and modular plugins that enable its operators to augment or change its capabilities over time, as well as pivot when objectives change. It was first discovered in December 2025.

research.checkpoint.com/2026/v

#linux #voidlink #malware #cloud #container #security #privacy #engineer #media #tech #news

⁉️"The framework includes multiple cloud-focused capabilities and modules, and is engineered to operate reliably in cloud and container environments over extended periods," the IT-Security company said in an analysis. "VoidLink's architecture is extremely flexible and highly modular, centered around a custom Plugin API that appears to be inspired by Cobalt Strike's Beacon Object Files (BOF) approach. This API is used in more than 30+ plug-in modules available by default."⁉️

👾The findings reflect a shift in threat actors focus from Windows to Linux systems that have emerged as the bedrock of cloud services and critical operations. Actively maintained and evolving, VoidLink is assessed to be the handiwork of China-affiliated threat actors.👾[ImageSource: Check Point Research]

VoidLink High Level Overview.

👾A cloud-first implant written in the Zig programming language, the toolkit can detect major cloud environments, viz. Amazon Web Services [AWS], Google Cloud, Microsoft Azure, Alibaba and Tencent, and adapt its behavior if it recognizes that it's running within a Docker container or a Kubernetes pod. It can also gather credentials associated with cloud environments and popular source code version control systems such as Git.👾

<https://ziglang.org/>

⁉️The targeting of these services is an indication that VoidLink is likely engineered to target software developers, either with an intent to steal sensitive data or leverage the access to conduct supply chain attacks.⁉️

Some of its other capabilities are listed below:

• Rootkit-like features using LD_PRELOAD, loadable kernel module [LKM], and eBPF to hide its processes based on the Linux kernel version
• An in-memory plugin system for extending functionality
• Support for varied command-and-control [C2] channels, such as HTTP/HTTPS, WebSocket, ICMP and DNS tunneling
• Form a peer-to-peer [P2P] or mesh-style network between compromised hosts

<https://en.wikipedia.org/wiki/Loadable_kernel_module>[ImageSource: Check Point Research]

Builder Panel to create customized Versions of VoidLink.

A Chinese web-based dashboard that allows the attackers to remotely control the implant, create bespoke versions on the fly, manage files, tasks and plugins, and carry out different stages of the attack cycle right from reconnaissance and persistence to lateral movement and defense evasion by wiping traces of malicious activity.

⁉️VoidLink supports 37 plugins that span anti-forensics, reconnaissance, containers, privilege escalation, lateral movement and other, transforming it into a full-fledged post-exploitation framework:⁉️

• Anti-forensics, to wipe or edit logs and shell history based on keywords and perform timestomping of files to hinder analysis
• Cloud, to facilitate Kubernetes and Docker discovery and privilege-escalation, container escapes, and probes for misconfigurations
• Credential harvesting, to collect credentials and secrets, including SSH keys, git credentials, local password material, browser credentials and cookies, tokens and API keys
• Lateral movement, to spread laterally using an SSH-based worm
• Persistence, to help establish persistence via dynamic linker abuse, cron jobs and system services
• Recon, to gather detailed system and environment information

👾Describing it as "impressive" and "far more advanced than typical Linux malware," Check Point said VoidLink features a core orchestrator component that handles C2 communications and task execution.👾

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst