Security

Featured image for: Value range propagation in GCC with Project Ranger.
Article

GCC and gcc-toolset versions in RHEL: An explainer

Benjamin Blasco

Red Hat Enterprise Linux strategically utilizes different GNU Compiler Collection (GCC) versions to ensure both stability and access to new compiler features.

containers
Article

My advice on SELinux container labeling

Daniel Walsh

Dan Walsh dives into how container engines Podman and Docker handle SELinux, a crucial security solution for file system protection.

Feature image for Red Hat Enterprise Linux.
Article

How image mode for RHEL improves security

Valentin Rothberg +1

Learn about the benefits and security features of image mode for Red Hat Enterprise Linux, including zero-drift supply chain.

Video Thumbnail
Video

Say hello to Red Hat Developer Hub

Red Hat Developer Editorial Team +1

Development teams know all about solving problems. You’re naturals at it, constantly looking at challenges in new ways, and unlocking answers with innovative solutions. But even so, developing software gets more complicated every day. With so many frameworks, technologies, and tools to learn; security and compliance standards to meet; new team members to onboard, and knowledge gaps to fill, every problem needs its own unique approach, and creating applications from a standing start can put real strain on your brain.

But what if you had a little helper? A self-service portal by your side, ready to point you in the right direction And start you off at a sprint? Built from the CNCF open-source Backstage project… say hello to Red Hat Developer Hub.

To find out more about Red Hat Developer Hub, visit https://red.ht/4bv187n.

containers
Article

Containerizing workloads on image mode for RHEL

Valentin Rothberg +2

Learn how to manage workloads using image mode for RHEL and set up a build pipeline to automate building, deploying, and managing Linux systems at scale.

Featured image for Red Hat Enterprise Linux.
Article

Rootless virtual machines with KVM and QEMU

Fernando Lozano

Did you know that Linux users don’t need root privileges to create and manage virtual machines? Running rootless VMs helps with keeping a good security posture and this article shows how.