Writing Sandboxed Software

I’ve written a series of articles on various Linux sandboxing capabilities that developers can make use of to write their programs in a more secure fashion. If you’re interested, have a look.

Here’s a link to all of the articles:

Seccomp Filters: http://www.insanitybit.com/2014/09/08/3719/

Linux Capabilities: http://www.insanitybit.com/2014/09/08/sandboxing-linux-capabilities/

Chroot Sandbox: http://www.insanitybit.com/2014/09/08/sandboxing-chroot-sandbox/

Apparmor: http://www.insanitybit.com/2014/09/08/sandboxing-apparmor/

And here’s a link to the GitHub for SyslogParse, the program I use as a demonstration:

https://github.com/insanitybit/SyslogParser

2 thoughts on “Writing Sandboxed Software

  1. Your posts are interesting and I appreciate your in depth recount of your approach to programming. There aren’t may websites that cover diverse topics with unique perspective. I hope you begin posting more often. Also, will you consider setting up an archive so we can read your posts more easily? Thanks for the content. You are brilliant.

Leave a Reply

Your email address will not be published. Required fields are marked *