--- This is the second part on the VirtualGuard Protector series which focuses on the virtualizat| mrT4ntr4's Blog
FC| mrT4ntr4's Blog
In my day job sometimes I need to edit documents using tools that are only available on Windows. As such, I have a virtual machine with Windows 10 running on VirtualBox. Recently I upgraded to Debian 13 and I took the opportunity to migrate to a libvirt-based solution. I explain here the steps that I followed.| Think In Geek
Trying to write the fastest possible VM-exit handler for CPUID| Samuel Tulach
Patching BIOS ROM and setting up VM to hide virtual machine presence| Samuel Tulach
DNS resolution is a vital component of any application infrastructure on Kubernetes. When your application code attempts to access another service in the Kubernetes cluster or even a service on the internet, it has to first lookup the IP address corresponding to the hostname of the service, before initiating a connection to the service. This name lookup process is often referred to as service discovery. In Kubernetes, the cluster DNS server, be it kube-dns or CoreDNS, resolves the service’s...| Istio Blog
Introducing Workload Entries: Bridging Kubernetes and VMs Historically, Istio has provided great experience to workloads that run on Kubernetes, but it has been less smooth for other types of workloads, such as Virtual Machines (VMs) and bare metal. The gaps included the inability to declaratively specify the properties of a sidecar on a VM, inability to properly respond to the lifecycle changes of the workload (e.g., booting to not ready to ready, or health checks), and cumbersome DNS workar...| Istio Blog
This post helps you to resolve macOS kernel panic issues when running Vagrant and Parallels with NFS synced folders.| Ashley's Blog
We’ve included a port of the Microvium embedded JavaScript runtime. We originally did this port even before we open sourced the CHERIoT project We haven’t talked about it much and that’s something of an omission, since it is quite a nice case study in supporting a managed language on a CHERI platform| CHERIoT Platform
In this post, I share how I set up a lightweight multi-node K3s Kubernetes cluster on Hyper-V Virtual Machines for a home lab environment. I cover how I set up and deployed applications to the clus…| Vuyisile's Blog
Kamal offers zero-downtime deploys, rolling restarts, asset bridging, remote builds, accessory service management, and everything else you need to deploy and manage your web app in production with Docker. Originally built for Rails apps, Kamal will work with any type of web app that can be containerized. We dig into Kamal, how it works, and how you could use it on your next project.| Matt Layman
This week, I built a new gaming PC and got GPU passthrough set up on it! In this| astrid.tech
DNS resolution is a vital component of any application infrastructure on Kubernetes. When your application code attempts to access another service in the Kubernetes cluster or even a service on the internet, it has to first lookup the IP address corresponding to the hostname of the service, before initiating a connection to the service. This name lookup process is often referred to as service discovery. In Kubernetes, the cluster DNS server, be it kube-dns or CoreDNS, resolves the service’s...| Istio Blog
Introducing Workload Entries: Bridging Kubernetes and VMs Historically, Istio has provided great experience to workloads that run on Kubernetes, but it has been less smooth for other types of workloads, such as Virtual Machines (VMs) and bare metal. The gaps included the inability to declaratively specify the properties of a sidecar on a VM, inability to properly respond to the lifecycle changes of the workload (e.g., booting to not ready to ready, or health checks), and cumbersome DNS workar...| Istio Blog
Overcoming obfuscation in binaries has always been an interesting topic for me, especially in combination with malware. Over the last weeks I’ve been playing around with Virtualised Code Protection in order to see how well I could handle it. I decided to download a simple crack-me challenge which is obfuscated with this technique. It takes …Taming Virtual Machine Based Code Protection – 1 Read More »| Malware and Stuff
Notes on experiments with ZRAM and vm.overcommit_memory| Random Ramblings
So, you’ve got libvirt installed on your Linux box and your looking for a simple application for running virtual machines. Look no further than Boxes, so far as it meets your needs, of course. What’s that you ask? What do you need to figure out to run on this on a Btrfs filesystem? Well, you’ve come to the right place! This post describes how to install and accommodate Boxes on Btrfs.| JWillikers
If you want to run virtual machines on Linux, chances are you’re going to use libvirt. I make use of it all the time, especially for testing these blog posts in a clean environment. libvirt provides a common interface around various underlying tools for virtual machine management. It not only offers features for guest management but for networking and storage management as well. It’s standard XML schema also makes for a powerful and versatile configuration format. On Linux, libvirt is typ...| JWillikers
With Google’s recent announcement of support for running real Linux apps on Chrome OS, I picked up a Pixelbook, since I’ve been long awaiting the viability of Chromebooks as development machines. After setting up a dev VM and experimenting with various projects, I found that one Tensorflow application I was playing with would lock up, hard, inside the Crostini VM on my Chromebook. After adding some debug prints, I discovered that virtually any calls into numpy.linalg.inv were hanging. I c...| nelhage debugs shit
The term "virtual machine" refers to two distinct and quite different concepts. People often confuse one with the other and wrongly assume quite a few things. Let's break it down: what does "virtual machine" really mean?| unascribed.com
VT-x is name of CPU virtualisation technology by Intel. KVM is component of Linux kernel which makes use of VT-x. And QEMU is a user-space application which allows users to create virtual machines.…| Binary Debt