Blog page
Fooling Port Scanners: Simulating Open Ports with eBPF and Rust
Learn how to use Rust and eBPF to thwart curious individuals attempting to scan a machine using the three-way handshake behavior and a related port scanning technique
Read moreMonitoring PostgreSQL Database on Kubernetes using eBPF
Learn how to use eBPF for monitoring PostgreSQL databases on Kubernetes
Read moreReverse engineering eBPF programs
Dive into the internals of how eBPF works by reverse engineering some eBPF-based programs
Read moreHow eBPF is shaping the future of Linux and platform engineering
Explore eBPF's origins, its impact on modernizing the kernel for cloud native use cases, and how it is becoming mainstream through projects like Cilium, Tetragon, and Pixie
Read moreUnveiling Hidden Threats: Detecting Unauthorized Access in Kubernetes with eBPF
Dive deep into using eBPF for security, specifically detecting unauthorized access attempts
Read moreThe Use of eBPF in Observability Today
Explore some of the specific technical and functional aspects of the use of eBPF in a number of leading obserability products
Read moreSecuring Linux Systems with eBPF: The Future of In-Kernel Observability and Security
Learn about eBPF, its integration with Linux, applications in monitoring and securing systems, and more
Read moreeBPF 如何重塑可观察性工程(第一部分
了解领先的可观察性平台如何在其工具中利用 eBPF 的强大功能
Read moreAya Rust Tutorial part 5: Using Maps
Learn how to pass data between the kernel and user space using Maps in eBPF
Read moreeBPF: Enabling security and performance to co-exist
Explore how eBPF enhances Linux kernel customization, enabling improved security and performance while offering deeper visibility and efficient packet processing in cloud native environments
Read more