Software Security
In today’s threat landscape, developers and security teams must lean on trusted frameworks, tools, and industry practices to ensure their systems are resilient against evolving cyber threats.
This post is a list or pointer to some of the most respected and widely adopted tools and standards in the software security ecosystem.
MITRE ATT&CK: Understanding the Adversary
Website: https://attack.mitre.org
The MITRE ATT&CK framework is a globally accessible knowledge base that catalogs adversary tactics and techniques based on real world observations. It provides invaluable insight into how attackers operate at various stages of the cyber kill chain, helping defenders anticipate and detect malicious behavior.
Understanding IPv6 Address Notation
IPv6 addresses are 128 bits long. One key architectural shift with IPv6 is the fixed boundary between the network and host portions of an address, which is set at /64. Eliminates ambiguity around subnetting, routing continues to work by prefix, just as it did with CIDR under IPv4, but routers are not required to examine all 64 bits of the network portion.
IPv6 Address Notation: The Basics
An IPv6 address is expressed as 8 groups of 16 bits, separated by colons. For example:
Bidirectional Sync Using Unison
When it comes to syncing files across directories or devices, most developers and power users turn to time tested tool like rsync. It’s fast, efficient, and ideal for one way synchronization. But what if you need true bidirectional sync, where changes in either directory are reflected in the other, automatically resolving conflicts and preserving the most recent updates?
That’s where Unison comes in.
Why Not Just Use rsync?
rsync excels at unidirectional sync, usually from a source to a target. However, It does not fit for use-case of trying to have a mirrored locally mounted directories of two cloud providers: