<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: capitangolo</title><link>https://news.ycombinator.com/user?id=capitangolo</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 13 May 2026 14:13:45 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=capitangolo" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by capitangolo in "Bambu Lab is abusing the open source social contract"]]></title><description><![CDATA[
<p>I honestly don't get it. They have more to win by doing things right than with this crap they pull out . Never getting a Bambulab.</p>
]]></description><pubDate>Tue, 12 May 2026 15:02:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=48109354</link><dc:creator>capitangolo</dc:creator><comments>https://news.ycombinator.com/item?id=48109354</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48109354</guid></item><item><title><![CDATA[Querying Vulnerability Databases From a Spreadsheet – And other better ways]]></title><description><![CDATA[
<p>Article URL: <a href="https://safetybits.io/blog/automating-vulnerability-detection/">https://safetybits.io/blog/automating-vulnerability-detection/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41849572">https://news.ycombinator.com/item?id=41849572</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 15 Oct 2024 15:25:34 +0000</pubDate><link>https://safetybits.io/blog/automating-vulnerability-detection/</link><dc:creator>capitangolo</dc:creator><comments>https://news.ycombinator.com/item?id=41849572</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41849572</guid></item><item><title><![CDATA[New comment by capitangolo in "GitHub Actions being abused to run crypto mining"]]></title><description><![CDATA[
<p>I really hope Microsoft bumps up their crypto mining detection (and other abuse) instead of cutting the free tier .</p>
]]></description><pubDate>Thu, 27 Oct 2022 10:45:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=33355700</link><dc:creator>capitangolo</dc:creator><comments>https://news.ycombinator.com/item?id=33355700</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33355700</guid></item><item><title><![CDATA[New comment by capitangolo in "Kubernetes 1.25 will be out next week – List of new features and deprecations"]]></title><description><![CDATA[
<p>"Container diff" -> Mindblown<p>Shouldn't be to different right? Kubernetes just stores the snapshots as tar packages.</p>
]]></description><pubDate>Tue, 16 Aug 2022 18:41:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=32486946</link><dc:creator>capitangolo</dc:creator><comments>https://news.ycombinator.com/item?id=32486946</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32486946</guid></item><item><title><![CDATA[Timeline: Killnet Cyber Attacks Against Italy and NATO Countries]]></title><description><![CDATA[
<p>Article URL: <a href="https://sysdig.com/blog/killnet-italy-and-nato/">https://sysdig.com/blog/killnet-italy-and-nato/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=31447643">https://news.ycombinator.com/item?id=31447643</a></p>
<p>Points: 7</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 20 May 2022 14:12:25 +0000</pubDate><link>https://sysdig.com/blog/killnet-italy-and-nato/</link><dc:creator>capitangolo</dc:creator><comments>https://news.ycombinator.com/item?id=31447643</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31447643</guid></item><item><title><![CDATA[What's new in Kubernetes 1.23? Releases next week]]></title><description><![CDATA[
<p>Article URL: <a href="https://sysdig.com/blog/kubernetes-1-23-whats-new/">https://sysdig.com/blog/kubernetes-1-23-whats-new/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=29393531">https://news.ycombinator.com/item?id=29393531</a></p>
<p>Points: 10</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 30 Nov 2021 15:59:18 +0000</pubDate><link>https://sysdig.com/blog/kubernetes-1-23-whats-new/</link><dc:creator>capitangolo</dc:creator><comments>https://news.ycombinator.com/item?id=29393531</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29393531</guid></item><item><title><![CDATA[New comment by capitangolo in "Container security best practices: Ultimate guide"]]></title><description><![CDATA[
<p>Hmm, that seems like a weird miss from my side.<p>i.e. We covered this across several articles like this one about tags:
<a href="https://sysdig.com/blog/toctou-tag-mutability/" rel="nofollow">https://sysdig.com/blog/toctou-tag-mutability/</a><p>This other one about file integrity monitoring (Disclaimer: A rather commercial one)
<a href="https://sysdig.com/blog/file-integrity-monitoring/" rel="nofollow">https://sysdig.com/blog/file-integrity-monitoring/</a><p>And I recall others more explicit on the read-only part, but I’m away from my laptop now.
Edit: Found it (point 1.3 in <a href="https://sysdig.com/blog/dockerfile-best-practices/" rel="nofollow">https://sysdig.com/blog/dockerfile-best-practices/</a> )<p>Thanks for pointing it out. Definitely it should be more explicit.</p>
]]></description><pubDate>Wed, 13 Oct 2021 19:10:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=28856132</link><dc:creator>capitangolo</dc:creator><comments>https://news.ycombinator.com/item?id=28856132</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28856132</guid></item><item><title><![CDATA[Crypto miner attack involving RinBot’s server, a popular Discord bot]]></title><description><![CDATA[
<p>Article URL: <a href="https://sysdig.com/blog/rinbot-discord-bot-crypto-miner/">https://sysdig.com/blog/rinbot-discord-bot-crypto-miner/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=25934126">https://news.ycombinator.com/item?id=25934126</a></p>
<p>Points: 7</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 27 Jan 2021 21:22:27 +0000</pubDate><link>https://sysdig.com/blog/rinbot-discord-bot-crypto-miner/</link><dc:creator>capitangolo</dc:creator><comments>https://news.ycombinator.com/item?id=25934126</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25934126</guid></item><item><title><![CDATA[AuditD vs. Falco as Host Intrusion Detection Tools]]></title><description><![CDATA[
<p>Article URL: <a href="https://sysdig.com/blog/falco-vs-auditd-hids/">https://sysdig.com/blog/falco-vs-auditd-hids/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=25837261">https://news.ycombinator.com/item?id=25837261</a></p>
<p>Points: 11</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 19 Jan 2021 19:02:20 +0000</pubDate><link>https://sysdig.com/blog/falco-vs-auditd-hids/</link><dc:creator>capitangolo</dc:creator><comments>https://news.ycombinator.com/item?id=25837261</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25837261</guid></item></channel></rss>