Introduction to Containers on Embedded Linux
Timesys » Embedded Development
by Brian Bender
1y ago
Timesys Introduction to Containers on Embedded Linux Containerized applications have been a common solution in the server and even desktop space for quite a while. More recently they’ve also been gaining interest on embedded projects. Containers can help decouple application development from the development of the embedded platform itself in timelines, teams, and tools. They can also allow application developers to work […] The post Introduction to Containers on Embedded Linux appeared first on Timesys from Brian Bender ..read more
Visit website
Securing U-Boot: A Guide to Mitigating Common Attack Vectors
Timesys » Embedded Development
by Nathan Barrett-Morrison
1y ago
Timesys Securing U-Boot: A Guide to Mitigating Common Attack Vectors Learn about ways in which you can protect and secure U-Boot implementations on your embedded systems. This involves signed FIT images, environment protections, and serial console disablement methods. The post Securing U-Boot: A Guide to Mitigating Common Attack Vectors appeared first on Timesys from Nathan Barrett-Morrison ..read more
Visit website
Discretionary Access Control (DAC) Hardening
Timesys » Embedded Development
by Nathan Barrett-Morrison
1y ago
Timesys Discretionary Access Control (DAC) Hardening Discretionary Access Control hardening can further improve your embedded system’s security by limiting userspace access to proprietary intellectual property, exploitable binaries, and privileged information. The example permissions shown here are defaults produced during a demonstration Yocto build. In Linux, a file has the following relevant parameters (when listing a file with the “ls” command):   The post Discretionary Access Control (DAC) Hardening appeared first on Timesys from Nathan Barrett-Morrison ..read more
Visit website
5 Lessons Learned From the Log4j Vulnerability…and How the Embedded Industry Can Be Better Prepared for the Next One
Timesys » Embedded Development
by Leah Simoncelli
1y ago
Timesys 5 Lessons Learned From the Log4j Vulnerability…and How the Embedded Industry Can Be Better Prepared for the Next One Log4j has set the security world ablaze. With the first vulnerability (CVE-2021-44228) ranked with a CVSS score of 10 — as high as the scale goes — everyone is paying attention.   The post 5 Lessons Learned From the Log4j Vulnerability…and How the Embedded Industry Can Be Better Prepared for the Next One appeared first on Timesys from Leah Simoncelli ..read more
Visit website
Securing U-Boot: A Guide to Mitigating Common Attack Vectors
Timesys » Embedded Development
by Nathan Barrett-Morrison
2y ago
Timesys Securing U-Boot: A Guide to Mitigating Common Attack Vectors Learn about ways in which you can protect and secure U-Boot implementations on your embedded systems. The post Securing U-Boot: A Guide to Mitigating Common Attack Vectors appeared first on Timesys from Nathan Barrett-Morrison ..read more
Visit website
Securing your Linux Configuration (Kernel Hardening)
Timesys » Embedded Development
by Nathan Barrett-Morrison
2y ago
This article discusses the process by which your kernel’s configuration can be strengthened to protect against common security exploits. This is sometimes referred to as hardening, or specifically in this context, kernel configuration hardening. A Linux kernel configuration is a file which defines all of the enabled (or disabled) options which are compiled in to your kernel. If you have not seen one before, they generally reside in ...   ..read more
Visit website
Discretionary Access Control (DAC) Hardening
Timesys » Embedded Development
by Nathan Barrett-Morrison
2y ago
Discretionary Access Control hardening can further improve your embedded system’s security by limiting userspace access to proprietary intellectual property, exploitable binaries, and privileged information. The example permissions shown here are defaults produced during a demonstration Yocto build. In Linux, a file has the following relevant parameters (when listing a file with the “ls” command):   ..read more
Visit website
5 Lessons Learned From the Log4j Vulnerability…and How the Embedded Industry Can Be Better Prepared for the Next One
Timesys » Embedded Development
by Leah Simoncelli
2y ago
Log4j has set the security world ablaze. With the first vulnerability (CVE-2021-44228) ranked with a CVSS score of 10 — as high as the scale goes — everyone is paying attention.   ..read more
Visit website
Stay in your workflow with Command Line Interface for Timesys’ Embedded Board Farm
Timesys » Embedded Development
by Leah Simoncelli
2y ago
Timesys’ Embedded Board Farm (EBF) lets you seamlessly access your hardware boards from anywhere as if it were right next to you. And we’ve just made it even easier and more convenient by adding our command line interface (CLI). This provides embedded software engineers with two major benefits:   ..read more
Visit website
A
by
ago
A ..read more
Visit website

Follow Timesys » Embedded Development on FeedSpot

Continue with Google
Continue with Apple
OR