Loading color scheme

Docker Images of Alpine Linux Had Hardcoded Passwords Flaw

Experts warned that the Alpine Linux Docker images, which had been distributed through the official Docker Hub for about three years, used an empty password (NULL) for the root account. The problem affected all versions of Alpine Linux since 3.3. It is worth noting that Alpine Linux is one of the most popular distributions on the Docker Hub, with more than 10,000,000 installations.

The vulnerability received the identifier CVE-2019-5021, and in this case it is interesting that it was not discovered for the first time. The problem was already paid attention in August 2015 and corrected in November. But only three weeks after the patch was released, in December 2015, the bug accidentally returned to the code, and was seen again only in January of this year by analysts. At first it was thought that the problem only affected the Glider Labs Alpine Linux image, but then it became clear that the official images had also suffered.

Read more
RFID: Radio Frequency Identification Systems

Radio Frequency Identification (RFID) is a technology for automatic contactless identification of objects using a radio frequency communication channel. Now this technology has no analogues, and its use has become so popular that, according to experts, RFID will soon replace bar-coding technology.
1. A basic RFID system consists of
radio frequency tag;
information reader (reader);
computer for information processing.
The identification of objects is carried out using a unique digital code that is read from the memory of the electronic tag attached to the identification object. The reader contains a transmitter and an antenna through which the electromagnetic field of a certain frequency is radiated. The radio-frequency tags that fall within the range of the reading field “respond” with their own signal containing information (product identification number, user data, etc.). The signal is captured by the antenna reader, the information is decoded and transmitted to the computer for processing.

Read more
RFID - from dream to reality

To imagine the possibilities and advantages of wireless communication technologies, let's recall an ordinary radio or mobile phone. We will now extend these benefits to the process of transmitting and collecting data using small portable devices, and we will come very close to understanding the nature and assessing the potential of radio frequency identification. RFID as an area of automatic identification, is now seen as a radical means of improving the data management process, which has several significant advantages over a bar code. The range of RFID devices and systems allows us to meet the needs of consumers in a much wider range. At the same time, absolutely fantastic opportunities arise for the integration of business processes in various areas, which previously could only be dreamed of. At the same time, using RFID technology is a simpler and more understandable process than using a mobile phone, and does not require that we know our technical details. Tens of thousands of Muscovites, passing every day on the subway using a contactless monthly travel card, do not even suspect that this is one of the RFID technologies. The same can be said about the use of anti-theft systems that are now on each car. They are controlled by RFID.

Read more
Get all interesting articles to your inbox
Please wait