Released Loadbars 0.13.0, neat tool for monitoring live Linux system resources of remote servers without havig to setup a observability pipeline and/or dashboards. I wrote it in Perl more than 13 years ago, but thanks to AI it's living again, rewritten in Go. https://foo.zone/gemfeed/2026-03-01-loadbars-0.13.0-released.html there are a bunch new features which the Perl version hadn't!

#loadbars #ssh #procfs #linux #monitoring #tool

📢 Secrets en ligne de commande : éviter les fuites via /proc, l’historique et l’environnement
📝 Source : billet de blog de Linus Heckemann (9 janvier 2026).
📖 cyberveille : https://cyberveille.ch/posts/2026-01-10-secrets-en-ligne-de-commande-eviter-les-fuites-via-proc-lhistorique-et-lenvironnement/
🌐 source : https://linus.schreibt.jetzt/posts/shell-secrets.html
#gestion_des_secrets #procfs #Cyberveille
Secrets en ligne de commande : éviter les fuites via /proc, l’historique et l’environnement

Source : billet de blog de Linus Heckemann (9 janvier 2026). L’auteur illustre d’abord le risque de « Process information leakage » lorsqu’un secret (ex. un token Bearer pour l’API GitLab) est passé en argument de commande, car les lignes de commande sont lisibles via /proc sur la plupart des distributions Linux (outils comme ps/pgrep). Des options comme hidepid pour /proc ou l’isolation par défaut de macOS limitent la visibilité inter-utilisateurs, mais la meilleure approche reste d’éviter de placer des secrets sur la ligne de commande.

CyberVeille

Ukrywamy nazwę procesu i jego parametry za pomocą programu zapper ( https://nfsec.pl/security/6686 ) #linux #security #procfs @hackerschoice

https://www.youtube.com/watch?v=xmeVjQdBICk

NF.sec – Bezpieczeństwo systemu Linux - Ukrywamy nazwę procesu i jego parametry za pomocą programu zapper

Z apper to mały program, który za pomocą ptrace() manipuluje stosem wektora pomocniczego (ang. auxiliary vector) formatu ELF (ang. Executable and Linkable Format), który posiada format tablicy w postaci par: „klucz – wartość” i jest przekazywany z jądra systemu do procesu w przestrzeni użytkownika, gdy program jest uruchamiany za pomocą funkcji systemowej execve(). Celem wspomnianego […]

Introduced in early Linux as a way to expose internal kernel data, /proc turned introspection into a superpower. Need to see CPU info? Memory usage? Active processes? It’s all just files. Unlike traditional tools that queried the system with custom code, /proc let you cat your way into real-time diagnostics. It's a filesystem, but it doesn't store data—it tells the story of your system in live detail. Even now, it's essential for system monitoring and scripting.

#Linux #ProcFS #UnixPhilosophy #SysAdminMagic

A story of Docker, QEMU, and memfd_create()

Last year I stumbled across a problem with the execution of a Docker container in a CI environment. The interesting case was that this is a container for a foreign architecture, which is supported by the –platform option and there are even official images on Docker Hub for this.

Initially, the problem presented itself like this:

$ docker run -it […]

#aarch64 #arm64 #debugging #docker #foss #kernel #linux #openSource #patch #procfs #qemu

https://raimue.blog/2023/11/23/a-story-of-docker-qemu-and-memfd-create/

A story of Docker, QEMU, and memfd_create()

Last year I stumbled across a problem with the execution of a Docker container in a CI environment. The interesting case was that this is a container for a foreign architecture, which is supported by the --platform option and there are even official images on Docker Hub for this. Initially, the problem presented itself like [...]

raimue.blog
pspy - nieuprzywilejowany podgląd procesów Linuksa ( https://nfsec.pl/security/6159 ) #linux #security #procfs #twittermigration
@xanderio @raichoo #linprocfs is here to stay AFAIK, but #procfs is going away. I cannot find the exact commit at the moment, but I found this: https://reviews.freebsd.org/D24254
⚙ D24254 Mark devel/strace as broken on 13.0 and later.

@raichoo @xanderio Uh, if I recall correctly, #procfs is not going to be available in #FreeBSD 13.0.