Isolating systems with Linux Namespaces

Isolating systems with Linux Namespaces

If you’ve used tools like Docker, you already know that these tools are capable of isolating processes in small “containers”. Running processes in Docker containers is like running them in virtual machines, only these containers are significantly lighter than virtual machines.

With the introduction of Linux namespaces, it became possible to have multiple “nested” process trees. Each process tree can have an entirely isolated set of processes. This can ensure that processes belonging to one process tree cannot inspect or kill – in fact cannot even know of the existence of – processes in other sibling or parent process trees. Every time a computer with Linux boots up, it starts with just one process, with process identifier (PID) 1. This process is the root of the process tree, and it initiates the rest of the system by performing the appropriate maintenance work and starting the correct daemons/services.

Datacenter transformation, RHEL &VDI

Datacenter transformation, RHEL &VDI

The event organized by our partner MicroCAD Systems on the Transformation of the Datacenter where they talked about the advantages of UDS Enterprise and Nutanix Acropolis as a VDI joint solution, the new features introduced in the new version of Red Hat Enterprise Linux and how our connection broker meets the current needs of the workplace have been the most popular articles in our blog during the las two weeks.

Find below the links to the posts on these topics so that you can keep up to date with the most interesting news on virtualization and Open Source according to our readers:

How to improve the security of Linux containers

How to improve the security of Linux containers

Software developers use Linux containers to save time and money, providing a mechanism to build much more manageable applications through development, testing and environments of implementation with a better security in the software life cycle as in their actions and scenarios.

According to Forrester, more than half of operations and IT development responsible see security as the biggest concern when adopting containers.

University of Murcia, VDI & Linux vulnerability

University of Murcia, VDI & Linux vulnerability

A new case study on our UDS Enterprise connection broker and a Spanish university, a report by the renowned consulting firm IDC recommending our software for VDI and a new vulnerability detected in Linux have been the most outstanding topics in our blog for the last two weeks.

Below you can find the links to the articles on these topics just in case you dind’t have the chance to read the most interesting news on virtualization and Open Source according to our community:

OpenNebula 5.2 Excession released

OpenNebula 5.2 Excession released

The OpenNebula project announced a few days ago the availability of the stable release of OpenNebula 5.2 Excession. In this release, some features introduced in 5.0 wizard has been stabilized and those features and components more demanded by the community have been implemented. Almost every component of OpenNebula has been reviewed to target usability and functional improvements.

Linux privilege-escalation vulnerablity

Linux privilege-escalation vulnerablity

Linux security expert Phil Oester discovered a privilege-escalation critical vulnerability affecting the Linux Kernel. This bug is called Dirty COW and identified as CVE-2016-5195 and although it has recently been discovered, it existed since 2007.

This flaw affects the component Kernel Memory Subsystem, allows to manipulate an unknown input and explote the vulnerability that may affect the system’s confidenciality, integrity and availability.

Skip to content