brand image

Octo-blog

some sort of internet octopus...

  • About
  • License
  • all posts
  • most recent:
  • Pushing Helm charts to AWS ECR with Gitlab-CI
  • Identifying Gitlab runner failures using v4 API calls
  • Shared objects: sonames, real names, and link names

powered by Hugo | themed with poison
© 2025 . All rights reserved.

Pushing Helm charts to AWS ECR with Gitlab-CI

March 27, 2024 - 6 mins read
The AWS ECR (Elastic Container Registry) is a managed container registry providing storage and access mechanisms for your container images or other OCI related assets.
Read More…

Identifying Gitlab runner failures using v4 API calls

March 22, 2024 - 4 mins read
Recently I was asked to look into a number of pipeline failures in Gitlab-CI.
Read More…

Shared objects: sonames, real names, and link names

October 28, 2023 - 7 mins read
  • linking
  • linkers
A client had a complaint about an internal library (libbar.so) they were consuming as a dependency of their own product (libfoo.
Read More…

Disaster Recovery and Business Continuity Management

June 3, 2023 - 4 mins read
  • Information Security
  • notes

Series: ISMP notes

Disaster Recovery and Business Continuity Management A Business Continuity Plan (BCP) is the programme for maintaining normal operations as effectively as possible whilst resolving any issues.
Read More…

Physical and Environmental Security

June 3, 2023 - 1 min read
  • Information Security
  • notes

Series: ISMP notes

Physical and Environmental Security Protection of Equipment Consider the threat of equipment being lost, stolen, taken offsite, or in some way rendered ineffective (eg.
Read More…

Procedural and People Security Controls

June 3, 2023 - 4 mins read
  • Information Security
  • notes

Series: ISMP notes

Procedural and People Security Controls Organizational Security Culture A positive security culture must be part of the overall organizational culture and be directed from the top of the organization.
Read More…

Technical Controls

June 3, 2023 - 6 mins read
  • Information Security
  • notes

Series: ISMP notes

Technical Controls Malicious Software (malware) Broadly malware is some unauthorised piece of running code that benefits the originator.
Read More…

Security Life Cycles

April 19, 2023 - 5 mins read
  • Information Security
  • notes

Series: ISMP notes

Security Life Cycles The Information Life Cycle The life cycle of information has three main stages which attract different IA activities:
Read More…

How to do a basic STPA

April 9, 2023 - 23 mins read
  • STPA
  • system analysis
  • theory
  • notes
  • engineering

Series: STPA

STPA can be considered to be a worst-case analysis method: it doesn’t consider the average cases or the best-case but identifies behaviours that should be prevented in order to mitigate accidents in those worst-cases.
Read More…

ChatGPT doesn't know it's bad at math

April 4, 2023 - 7 mins read
  • AI
  • tangents
  • shower thoughts
ChatGPT: master paraphraser Recently there’s been a lot of media attention around AI and in particular ChatGPT.
Read More…

1 2 Next »