Linux Consultant
  • Home
  • About
  • Contact
  • Login
  • Profile
  • Privacy Policy
  • Home
  • About
  • Contact
  • Login
  • Profile
  • Privacy Policy
March 6, 2025 | by Scott Kilroy | No comments

How attackers hide malicious code in a container application

Malicious Trojan horse programs have been part of the IT landscape for decades. It is easier than you think to create an application with a secret purpose. We'll show you how.

no related pages

Source: Linux Magazine Full Feed

Search

Recent Posts

  • GIMP 3.2 is out with Link Layers, SVG export and better painting UX
  • The best external hard drives of 2026: Expert tested
  • GIMP 3.2 Released! Link & Vector Layers, SVG Export [Ubuntu PPA]
  • FOSS Force’s Top Five Articles — For the Week Ending March 13, 2026
  • unifont @ Savannah: Unifont 17.0.04 Released
  • From Novell to $6 Billion: Behind Reuters’ Latest SUSE Sale Report
  • Distribution Release: GLF OS 25.11
  • FSF Blogs: The FSF doesn’t usually sue for copyright infringement, but when we do, we settle for freedom
  • Good News! Google Chrome on Linux is Getting the Much Awaited Upgrade
  • Is your AI agent a security risk? NanoClaw wants to put it in a virtual cage

Tags

AI AlmaLinux app Apps App Updates aws beginner's guide blog C++ Debian 11 Debian 12 desktop environment Developer Discord distro distros docker Firefox FOSS free software git GNU/Linux Howtos HTML install instructions Java JavaScript kde KDE Plasma LF Platinum Member Content Linux distribution Linux tutorial new release News Raspberry Pi release RHEL Rocky Linux security The Linux Foundation tutorial Tutorials ubuntu 22.04 Ubuntu 22.04 LTS windows os
Copyright © 2023 Linux Consultant