Secure Coding

Featured image for Valgrind.
Article

How to use Valgrind to track file descriptors

Mark Wielaard

Valgrind can be used to track file descriptors. Learn how to find file descriptors at various stages of your program and where they were originally opened.

Node.js reference architecture
Article

8 elements of securing Node.js applications

Lucas Holmquist

Discover key elements of building security into your software development process such as managing access in part 9 of the Node.js reference architecture series.

Featured image for a Linux topic.
Article

Quality testing the Linux kernel

Jeff Bastian

Most Linux kernel testing happens from userspace and can be done using simple commands for system calls, logging, and more.

secure coding - simple
Article

Subscription benefits for secure deployments

Mikel Sanchez

Follow this step-by-step guide to create secure deployments in Red Hat services using entitlements, certificate authority, configuration files, and BuildConfig.

Featured image for: Debug .NET applications running on Kubernetes with VS Code.
Article

Use VS Code to debug .NET applications

Tom Deseyn

Visual Code is an easy way to debug .NET applications in cloud environments like Kubernetes and OpenShift. Learn which plug-ins and configurations you need.

Featured image for: Can we consider --editable a bad practice?
Article

Extracting information from Python source code

Fridolin Pokorny

A simple tool called invectio, from Project Thoth, uses static source code analysis to display the symbols used or exported by Python source code.

Red Hat Data Grid logo
Product

Red Hat Data Grid

An intelligent, distributed caching solution that boosts application performance, provides greater deployment flexibility, and minimizes the overhead of standing up new applications.