swtpm
The goal of the swtpm project is to provide a TPM emulator (TPM 1.2 & TPM 2) that can be integrated into virtualized environments, such as virtual machines and containers. So far it has been integrated into QEMU and as a prototype into RunC…
a zone for no one and everyone :) Btw this blog is only for adults! Dieser Blog ist nur für Erwachsene!
The goal of the swtpm project is to provide a TPM emulator (TPM 1.2 & TPM 2) that can be integrated into virtualized environments, such as virtual machines and containers. So far it has been integrated into QEMU and as a prototype into RunC…
This tutorial explains how to install and run Windows 10 on Linux using GPU passthrough and VFIO drivers to achieve near-native performance – for gaming, photo or video editing, and other graphics and CPU intensive tasks. It also lists the common pitfalls and possible ways to further improve performance. Last not least it offers a comprehensive list of external resources and helpful links.
https://www.heiko-sieger.info/running-windows-10-on-linux-using-kvm-with-vga-passthrough/
Some Qemu further reading:
https://www.atechtown.com/install-qemu-on-ubuntu/
Also the stuff from Pavol Elsig on YT is very interesting
Webcamoid is a full featured and multiplatform webcam suite.
A nice curated list of known Linux malware
“In 1985 Steve Jobs resigned from Apple and founded NeXT Inc. in order to build the NeXT Computer. It was ahead of its time and had amazing features thanks to the NeXTSTEP operating system, most famously used at CERN by Sir Tim Berners-Lee to create the World Wide Web. NeXTSTEP later became OPENSTEP and when Apple acquired NeXT in 1997, they used it as the basis for Mac OS X and iOS. If you've done any Mac or iOS programming, you've seen the echoes of NeXTSTEP in the type names – NSObject, NSString, NSDictionary, and many others all come directly from NeXT (NS = NeXTSTEP).
These computers cost about as much as a new car when they first came out, so they were out of reach for most people. What was it like to use a top of the line system in the early 90s? Let's build our own and find out!…”
https://learn.adafruit.com/build-your-own-next-with-a-virtual-machine?view=all
“Portmaster : Take Back Control of Your Computer ( Love Freedom – Block Mass Surveillance ) – Portmaster is a free and open-source application that puts you back in charge over all your computer's network connection…”
Linux kernel security is a very complex topic. Some defence technologies are provided by the Linux kernel mainline. Others are going out‑of‑tree for various reasons (some of them are commercial, for example). Plus there are kernel defences that depend on special hardware features…
https://github.com/a13xp0p0v/linux-kernel-defence-map
A rubber ducky is a tool that can be used to takeover most computers just by being plugged into them for a few seconds. How it works is an attacker plugs a USB into a computer, this USB acts as a keyboard and injects keystrokes at superhuman speed. Often these keystrokes are commands that tell the victim computer to connect itself to the attacker’s computer (aka a reverse shell)·…
https://github.com/armosec/kubescape
Disclaimer: Watch out this link redirects to a US .gov page, better use TOR or something! Just saying.
https://media.defense.gov/2021/Aug/03/2002820425/-1/-1/1/CTR_KUBERNETES%20HARDENING%20GUIDANCE.PDF
https://github.com/sysprog21/lkmpg
Here you can find the PDF
https://github.com/sysprog21/lkmpg/releases/download/latest/lkmpg.pdf