Blog page
Unleash the Forbidden - Enabling eBPF/XDP for Kernel Tinkering on WSL2
Learn how to run eBPF on WSl2 running on Windows 10
Read moreWie eBPF die Logdaten-Sammlung revolutioniert
Erfahren Sie, wie eBPF die Protokoll- und Metrikerfassung revolutioniert hat
Read moreIntro to development using eBPF
Learn how to build a development docker container for eBPF and libbpf tooling
Read moreHello eBPF: Global Variables (10)
The tenth installment of the Hello eBPF series. In this part, you'll learn how to use global variables to configure our eBPF and communicate between user-land and kernel-land
Read moreDemystifying eBPF with Liz Rice: A Deep Dive into Kernel Programming and Security
In this podcast, Liz sheds light on the evolution of eBPF from a packet filtering tool to a powerful kernel programming technology
Read moreLeveraging eBPF for DevSecOps
Learn how eBPF's raw data can be combined with Cloud APIs can allow users to understand application-layer identity, provide real-time security, pinpoint problem origins and stop threats with surgical, active response
Read moreDetecting Advanced Persistent Threats (APTs) in Financial Systems with eBPF
Explore how eBPF enhances security in Kubernetes for financial systems by detecting Advanced Persistent Threats (APTs)
Read moreTetragon Process Lifecycle Observation: eBPF Part
Learn how Tetragon detects process creation and termination using eBPF
Read moreUsing Tc-Bpf Program To Redirect Dns Traffic In Docker Containers
A practical guide for implementing DNS redirection amd using TC-BPF to enhance network control within containerized environments
Read moreOptimizing Local Socket Communication: SOCKMAP and eBPF
A detailed overview of how SOCKMAP works in conjunction with eBPF to splice sockets, allowing for streamlined communication between different network namespaces or within a single namespace
Read more