|
You are here |
jameshfisher.com | ||
| | | | |
thorstenball.com
|
|
| | | | | [AI summary] The article explains how Unicorn, a web server, leverages Unix system calls and concepts like fork, pipe, and signal handling to efficiently manage web requests. It highlights features such as hot reloading, zero downtime deployments, and worker process scaling using signals. The author emphasizes that these capabilities are not magic but a result of understanding and utilizing Unix's low-level mechanisms. The article also discusses the importance of knowing system-level details for debugging, architectural decisions, and deeper understanding of how software operates on the underlying system. | |
| | | | |
objective-see.com
|
|
| | | | | [AI summary] The blog post explains the intricacies of Unix process creation, particularly focusing on the behavior of the `sh -c whoami` command. It clarifies why the process tree appears as it does, involving multiple `exec` calls without forking. The key takeaway is that `sh` can invoke `bash` with the `-c` flag, leading to a sequence of process images. Understanding these process dynamics is crucial for threat hunters working on macOS systems. | |
| | | | |
blog.nelhage.com
|
|
| | | | | reptyr (announced recently on this blog) takes a process that is currently running in one terminal, and transplants it to a new terminal. reptyr comes from a proud family of similar hacks, and works in the same basic way: We use ptrace(2) to attach to a target process and force it to execute code of our own choosing, in order to open the new terminal, and dup2(2) it over stdout and stderr. | |
| | | | |
www.p1sec.com
|
|
| | | Learn about GSMA FS.31 Baseline Security guidelines for mobile networks. Discover how P1 Security's solutions can help secure your network and protect it from evolving cybersecurity threats. | ||