Open Source Alternatives to Popular SaaS Products

Open Source Alternatives to Popular SaaS Products https://ift.tt/Cb7Q8zp API Platform Hoppscotch API development ecosystem Postman Auth & SSO Cerbos Granular access control Okta, Auth0 Auth & SSO Keycloak User authentication and session management framework Okta, Auth0 Auth & SSO OPAL (Permit.io) Authorization adminstration framework (Open Policy) Okta, Auth0 Auth & SSO Ory Identity platform Okta, […]

Docker container security cheat sheet

Docker container security cheat sheet https://ift.tt/3xfbOCe Docker containers have been an essential part of the developer’s toolbox for several years now, allowing them to build, distribute and deploy their applications in a standardized way. This gain in traction has been, not surprisingly, accompanied by a surge in security issues related to containerization technology. Indeed, containers […]

Docker container security cheat sheet

Docker container security cheat sheet https://ift.tt/3xfbOCe Docker containers have been an essential part of the developer’s toolbox for several years now, allowing them to build, distribute and deploy their applications in a standardized way. This gain in traction has been, not surprisingly, accompanied by a surge in security issues related to containerization technology. Indeed, containers […]

Brython: an implementation of Python 3 running in the browser

Brython: an implementation of Python 3 running in the browser https://ift.tt/1uNnN2b brython Brython (Browser Python) is an implementation of Python 3 running in the browser, with an interface to the DOM elements and events. Here is a simple example of an HTML page running Python: <html> <head> <script type=”text/javascript” src=”/path/to/brython.js”></script> </head> <body onload=”brython()”> <script type=”text/python”> […]

Docker Security Cheat Sheet

Docker Security Cheat Sheet https://ift.tt/2tgi15r Docker Security Cheat Sheet Introduction Docker is the most popular containerization technology. Upon proper use, it can increase the level of security (in comparison to running applications directly on the host). On the other hand, some misconfigurations can lead to downgrade the level of security or even introduce new vulnerabilities. […]