<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:media="http://search.yahoo.com/mrss/"
	>

<channel>
	<title>Holistic Security</title>
	<atom:link href="https://holisticsecurity.wordpress.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://holisticsecurity.wordpress.com</link>
	<description>Open Source, Security, BigData, DevOps in SDLC and Cloud</description>
	<lastBuildDate>Fri, 13 Dec 2019 18:20:39 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>http://wordpress.com/</generator>
<cloud domain='holisticsecurity.wordpress.com' port='80' path='/?rsscloud=notify' registerProcedure='' protocol='http-post' />
<image>
		<url>https://secure.gravatar.com/blavatar/99c5c05390d8fbdacee5695d51c18d26d5cb681d04c4def9b01b752381b7cbeb?s=96&#038;d=https%3A%2F%2Fs0.wp.com%2Fi%2Fbuttonw-com.png</url>
		<title>Holistic Security</title>
		<link>https://holisticsecurity.wordpress.com</link>
	</image>
	<atom:link rel="search" type="application/opensearchdescription+xml" href="https://holisticsecurity.wordpress.com/osd.xml" title="Holistic Security" />
	<atom:link rel='hub' href='https://holisticsecurity.wordpress.com/?pushpress=hub'/>
	<item>
		<title>Using Weave Scope to explore Microservices Communication and Service Mesh (OpenShift and Istio)</title>
		<link>https://holisticsecurity.wordpress.com/2018/01/12/using-weave-scope-to-explore-microservices-communication-and-service-mesh-openshift-and-istio/</link>
					<comments>https://holisticsecurity.wordpress.com/2018/01/12/using-weave-scope-to-explore-microservices-communication-and-service-mesh-openshift-and-istio/#respond</comments>
		
		<dc:creator><![CDATA[RRMMCCEE]]></dc:creator>
		<pubDate>Fri, 12 Jan 2018 00:50:10 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[PaaS]]></category>
		<category><![CDATA[Service Mesh]]></category>
		<category><![CDATA[Envoy Proxy]]></category>
		<category><![CDATA[Istio]]></category>
		<category><![CDATA[OpenShift]]></category>
		<category><![CDATA[Weave Scope]]></category>
		<guid isPermaLink="false">http://holisticsecurity.io/?p=2044</guid>

					<description><![CDATA[If you are working with ESB, Message Brokers, BPMS, SOA or Microservices, you will notice that you are solving the same problems of Standalone Applications but in different way, because all of them are different kind of Distributed Application. Those<span class="ellipsis">&#8230;</span><div class="read-more"><a href="https://holisticsecurity.wordpress.com/2018/01/12/using-weave-scope-to-explore-microservices-communication-and-service-mesh-openshift-and-istio/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
		
					<wfw:commentRss>https://holisticsecurity.wordpress.com/2018/01/12/using-weave-scope-to-explore-microservices-communication-and-service-mesh-openshift-and-istio/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content url="https://2.gravatar.com/avatar/87dc834d24fa9c1a310815b2677848102c67691917bde186627161f7a4404e97?s=96&#38;d=https%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">rrmmccee</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2018/01/api-mesh-security-2-weave-scope.png" medium="image">
			<media:title type="html">api-mesh-security-2-weave-scope</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2018/01/istio-architecture.png" medium="image">
			<media:title type="html">istio-architecture</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2018/01/api-mesh-security-7-weave-scope-istio-system.png" medium="image" />

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2018/01/api-mesh-security-8-weave-scope-bookinfo.png" medium="image" />

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2018/01/api-mesh-security-9-weave-scope-bookinfo-mesh.png" medium="image" />

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2018/01/api-mesh-security-4-istio-zipkin.png" medium="image" />

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2018/01/api-mesh-security-5-istio-grafana.png" medium="image" />

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2018/01/api-mesh-security-6-istio-servicegraph.png" medium="image" />
	</item>
		<item>
		<title>Apache NiFi and TLS Toolkit Ansible Roles to create a multi-node secure NiFi cluster</title>
		<link>https://holisticsecurity.wordpress.com/2017/05/17/apache-nifi-and-tls-toolkit-ansible-roles-to-create-a-multi-node-secure-nifi-cluster/</link>
					<comments>https://holisticsecurity.wordpress.com/2017/05/17/apache-nifi-and-tls-toolkit-ansible-roles-to-create-a-multi-node-secure-nifi-cluster/#comments</comments>
		
		<dc:creator><![CDATA[RRMMCCEE]]></dc:creator>
		<pubDate>Wed, 17 May 2017 00:24:52 +0000</pubDate>
				<category><![CDATA[Big Data]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Ansible]]></category>
		<category><![CDATA[Apache NiFi]]></category>
		<category><![CDATA[TLS]]></category>
		<category><![CDATA[Vagrant]]></category>
		<guid isPermaLink="false">http://holisticsecurity.io/?p=2016</guid>

					<description><![CDATA[I&#8217;ve created 2 Ansible Roles (chilcano.apache-nifi and chilcano.apache-nifi-toolkit) to automate the creation of a multi-node and secure NiFi cluster. At the moment, the chilcano.apache-nifi Ansible Role doesn&#8217;t implement Cluster State coordination through Apache ZooKeeper. It will be implemented in the<span class="ellipsis">&#8230;</span><div class="read-more"><a href="https://holisticsecurity.wordpress.com/2017/05/17/apache-nifi-and-tls-toolkit-ansible-roles-to-create-a-multi-node-secure-nifi-cluster/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
		
					<wfw:commentRss>https://holisticsecurity.wordpress.com/2017/05/17/apache-nifi-and-tls-toolkit-ansible-roles-to-create-a-multi-node-secure-nifi-cluster/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		
		<media:content url="https://2.gravatar.com/avatar/87dc834d24fa9c1a310815b2677848102c67691917bde186627161f7a4404e97?s=96&#38;d=https%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">rrmmccee</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2017/05/nifi-multi-node-ansible-automation.png" medium="image">
			<media:title type="html">Automated provisioning Apache NiFi multi-node cluster with Ansible and Vagrant</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2017/05/nifi-toolkit-files-generated.png" medium="image">
			<media:title type="html">Apache NiFi Toolkit - folder structure and files generated</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2017/05/nifi-multi-node-client-cert-1install.png" medium="image">
			<media:title type="html">Install the Client Certificate</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2017/05/nifi-multi-node-client-cert-1select.png" medium="image">
			<media:title type="html">Select the Client Certificate</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2017/05/nifi-multi-node-browser-all.png" medium="image">
			<media:title type="html">Open NiFi from Firefox</media:title>
		</media:content>
	</item>
		<item>
		<title>My 3 Ansible Roles to mass provision Kismet and Apache MiNiFi for wardriving at scale</title>
		<link>https://holisticsecurity.wordpress.com/2017/03/29/my-3-ansible-roles-to-mass-provision-kismet-and-apache-minifi-for-wardriving-at-scale/</link>
					<comments>https://holisticsecurity.wordpress.com/2017/03/29/my-3-ansible-roles-to-mass-provision-kismet-and-apache-minifi-for-wardriving-at-scale/#respond</comments>
		
		<dc:creator><![CDATA[RRMMCCEE]]></dc:creator>
		<pubDate>Wed, 29 Mar 2017 20:10:25 +0000</pubDate>
				<category><![CDATA[Big Data]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Ansible]]></category>
		<category><![CDATA[Apache MiNiFi]]></category>
		<category><![CDATA[Apache NiFi]]></category>
		<category><![CDATA[Raspberry Pi]]></category>
		<guid isPermaLink="false">http://holisticsecurity.io/?p=1936</guid>

					<description><![CDATA[This blog post is implementing the same scenario used in the previous post Mass provisioning of Kismet and Apache MiNiFi in Raspberry Pi using Ansible. The unique difference is this new blog post I&#8217;m using Ansible Roles instead of Ansible<span class="ellipsis">&#8230;</span><div class="read-more"><a href="https://holisticsecurity.wordpress.com/2017/03/29/my-3-ansible-roles-to-mass-provision-kismet-and-apache-minifi-for-wardriving-at-scale/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
		
					<wfw:commentRss>https://holisticsecurity.wordpress.com/2017/03/29/my-3-ansible-roles-to-mass-provision-kismet-and-apache-minifi-for-wardriving-at-scale/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content url="https://2.gravatar.com/avatar/87dc834d24fa9c1a310815b2677848102c67691917bde186627161f7a4404e97?s=96&#38;d=https%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">rrmmccee</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2017/03/mass-provisioning-kismet-minifi-raspberrypi-ansible-2-pkg.png" medium="image">
			<media:title type="html">https://holisticsecurity.wordpress.com/wp-content/uploads/2017/03/mass-provisioning-kismet-minifi-raspberrypi-ansible-2-pkg.png</media:title>
		</media:content>
	</item>
		<item>
		<title>Mass provisioning of Kismet and Apache MiNiFi in Raspberry Pi using Ansible</title>
		<link>https://holisticsecurity.wordpress.com/2017/03/20/mass-provisioning-of-kismet-and-apache-minifi-in-raspberry-pi-using-ansible/</link>
					<comments>https://holisticsecurity.wordpress.com/2017/03/20/mass-provisioning-of-kismet-and-apache-minifi-in-raspberry-pi-using-ansible/#comments</comments>
		
		<dc:creator><![CDATA[RRMMCCEE]]></dc:creator>
		<pubDate>Mon, 20 Mar 2017 21:35:53 +0000</pubDate>
				<category><![CDATA[Big Data]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Ansible]]></category>
		<category><![CDATA[Apache MiNiFi]]></category>
		<category><![CDATA[Apache NiFi]]></category>
		<category><![CDATA[Kismet]]></category>
		<category><![CDATA[Raspberry Pi]]></category>
		<guid isPermaLink="false">http://holisticsecurity.io/?p=1908</guid>

					<description><![CDATA[Lately I&#8217;m focusing on Automation in Big-Data Projects, and with my experience in Cyber Security I can bring new approaches and ideas to those Big-Data Projects are related to IT Security aspects (Threat Analisys, Privacy, Intrusion Detection, etc.). With this<span class="ellipsis">&#8230;</span><div class="read-more"><a href="https://holisticsecurity.wordpress.com/2017/03/20/mass-provisioning-of-kismet-and-apache-minifi-in-raspberry-pi-using-ansible/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
		
					<wfw:commentRss>https://holisticsecurity.wordpress.com/2017/03/20/mass-provisioning-of-kismet-and-apache-minifi-in-raspberry-pi-using-ansible/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		
		<media:content url="https://2.gravatar.com/avatar/87dc834d24fa9c1a310815b2677848102c67691917bde186627161f7a4404e97?s=96&#38;d=https%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">rrmmccee</media:title>
		</media:content>

		<media:content url="https://raw.githubusercontent.com/chilcano/ansible-raspberrypi-wardriving/master/images/mass-provisioning-kismet-minifi-raspberrypi-ansible-1-arch.png" medium="image">
			<media:title type="html">https://raw.githubusercontent.com/chilcano/ansible-raspberrypi-wardriving/master/images/mass-provisioning-kismet-minifi-raspberrypi-ansible-1-arch.png</media:title>
		</media:content>
	</item>
		<item>
		<title>Data routing, transformation, and system mediation in Big Data &#038; IoT scenarios with Apache NiFi</title>
		<link>https://holisticsecurity.wordpress.com/2016/12/02/data-routing-transformation-and-system-mediation-in-big-data-iot-scenarios-with-apache-nifi/</link>
					<comments>https://holisticsecurity.wordpress.com/2016/12/02/data-routing-transformation-and-system-mediation-in-big-data-iot-scenarios-with-apache-nifi/#comments</comments>
		
		<dc:creator><![CDATA[RRMMCCEE]]></dc:creator>
		<pubDate>Fri, 02 Dec 2016 00:06:47 +0000</pubDate>
				<category><![CDATA[BAM]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[DevOps]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Observability]]></category>
		<category><![CDATA[Apache NiFi]]></category>
		<guid isPermaLink="false">http://holisticsecurity.io/?p=1691</guid>

					<description><![CDATA[So a few months ago I published a serie of post explaining how to capture WIFI traffic and process it near to real time by using WSO2 BAM, CEP Siddhi, Apache Cassandra, Apache Thrift, Kismet running on a Raspberry Pi<span class="ellipsis">&#8230;</span><div class="read-more"><a href="https://holisticsecurity.wordpress.com/2016/12/02/data-routing-transformation-and-system-mediation-in-big-data-iot-scenarios-with-apache-nifi/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
		
					<wfw:commentRss>https://holisticsecurity.wordpress.com/2016/12/02/data-routing-transformation-and-system-mediation-in-big-data-iot-scenarios-with-apache-nifi/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		
		<media:thumbnail url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/12/04-wifi-traffic-capture-apache-nifi-minifi.png" />
		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/12/04-wifi-traffic-capture-apache-nifi-minifi.png" medium="image">
			<media:title type="html">04-wifi-traffic-capture-apache-nifi-minifi</media:title>
		</media:content>

		<media:content url="https://2.gravatar.com/avatar/87dc834d24fa9c1a310815b2677848102c67691917bde186627161f7a4404e97?s=96&#38;d=https%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">rrmmccee</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/12/01-wifi-traffic-capture-wso2-bam.png" medium="image">
			<media:title type="html">https://holisticsecurity.wordpress.com/wp-content/uploads/2016/12/01-wifi-traffic-capture-wso2-bam.png</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/12/02-wifi-traffic-capture-elasticsearch-logstash-kibana.png" medium="image">
			<media:title type="html">https://holisticsecurity.wordpress.com/wp-content/uploads/2016/12/02-wifi-traffic-capture-elasticsearch-logstash-kibana.png</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/12/03-apache-nifi-logo.png" medium="image">
			<media:title type="html">https://holisticsecurity.wordpress.com/wp-content/uploads/2016/12/03-apache-nifi-logo.png</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/12/05-wifi-traffic-capture-apache-nifi.png" medium="image">
			<media:title type="html">https://holisticsecurity.wordpress.com/wp-content/uploads/2016/12/05-wifi-traffic-capture-apache-nifi.png</media:title>
		</media:content>
	</item>
		<item>
		<title>Provisioning massively cross-compiled binaries to Raspberry Pi (arm) using Vagrant, VirtualBox, Ansible and Python</title>
		<link>https://holisticsecurity.wordpress.com/2016/04/12/provisioning-massively-crosscompiled-bin-rpi-armv7-using-vagrant-virtualbox-ansible-python/</link>
					<comments>https://holisticsecurity.wordpress.com/2016/04/12/provisioning-massively-crosscompiled-bin-rpi-armv7-using-vagrant-virtualbox-ansible-python/#respond</comments>
		
		<dc:creator><![CDATA[RRMMCCEE]]></dc:creator>
		<pubDate>Tue, 12 Apr 2016 16:46:31 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Open Source]]></category>
		<category><![CDATA[Ansible]]></category>
		<category><![CDATA[ARM]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Python]]></category>
		<category><![CDATA[Raspberry Pi]]></category>
		<category><![CDATA[Vagrant]]></category>
		<guid isPermaLink="false">http://holisticsecurity.wordpress.com/?p=1681</guid>

					<description><![CDATA[If you are involved in an IoT or Mobile Application provisioning Project you probably need build a mechanism to spread your application binaries to all Devices on stock and to all the rolled out Devices. With this Proof-of-concept I will<span class="ellipsis">&#8230;</span><div class="read-more"><a href="https://holisticsecurity.wordpress.com/2016/04/12/provisioning-massively-crosscompiled-bin-rpi-armv7-using-vagrant-virtualbox-ansible-python/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
		
					<wfw:commentRss>https://holisticsecurity.wordpress.com/2016/04/12/provisioning-massively-crosscompiled-bin-rpi-armv7-using-vagrant-virtualbox-ansible-python/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content url="https://2.gravatar.com/avatar/87dc834d24fa9c1a310815b2677848102c67691917bde186627161f7a4404e97?s=96&#38;d=https%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">rrmmccee</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/04/blog-cross-compiling-kismet-raspberrypi-arm.png" medium="image">
			<media:title type="html">blog-cross-compiling-kismet-raspberrypi-arm.png</media:title>
		</media:content>
	</item>
		<item>
		<title>PaaS or micro-PaaS for Microservices? &#8211; a simple technology review</title>
		<link>https://holisticsecurity.wordpress.com/2016/03/10/paas-for-microservices-simple-review/</link>
					<comments>https://holisticsecurity.wordpress.com/2016/03/10/paas-for-microservices-simple-review/#comments</comments>
		
		<dc:creator><![CDATA[RRMMCCEE]]></dc:creator>
		<pubDate>Thu, 10 Mar 2016 15:56:24 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[ESB]]></category>
		<category><![CDATA[Microservices]]></category>
		<category><![CDATA[PaaS]]></category>
		<category><![CDATA[SOA]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[Restful API]]></category>
		<guid isPermaLink="false">http://holisticsecurity.wordpress.com/?p=1672</guid>

					<description><![CDATA[&#8220;How do you eat an elephant? One bite at a time&#8221; &#8211; This phrase makes sense, everybody understands It but sometimes is forgotten. Happily some technology companies have managed to internalize this phrase in its processes and products. Below some<span class="ellipsis">&#8230;</span><div class="read-more"><a href="https://holisticsecurity.wordpress.com/2016/03/10/paas-for-microservices-simple-review/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
		
					<wfw:commentRss>https://holisticsecurity.wordpress.com/2016/03/10/paas-for-microservices-simple-review/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		
		<media:content url="https://2.gravatar.com/avatar/87dc834d24fa9c1a310815b2677848102c67691917bde186627161f7a4404e97?s=96&#38;d=https%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">rrmmccee</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2019/11/blog-pass-microservices-how-do-you-eat-an-elephant-one-bite-at-a-time.png" medium="image">
			<media:title type="html">https://holisticsecurity.wordpress.com/wp-content/uploads/2019/11/blog-pass-microservices-how-do-you-eat-an-elephant-one-bite-at-a-time.png</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2019/11/blog-paas-microservice-1-paas-definition.png" medium="image">
			<media:title type="html">PaaS definition - Wikipedia</media:title>
		</media:content>
	</item>
		<item>
		<title>Running multi-container (WSO2 BAM &#038; MAC Address Lookup) Docker Application using Docker Compose</title>
		<link>https://holisticsecurity.wordpress.com/2016/03/09/running-multi-container-wso2-bam-mac-address-lookup-docker-application-using-docker-compose/</link>
					<comments>https://holisticsecurity.wordpress.com/2016/03/09/running-multi-container-wso2-bam-mac-address-lookup-docker-application-using-docker-compose/#respond</comments>
		
		<dc:creator><![CDATA[RRMMCCEE]]></dc:creator>
		<pubDate>Wed, 09 Mar 2016 11:20:44 +0000</pubDate>
				<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Microservices]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SOA]]></category>
		<category><![CDATA[Apache Cassandra]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[Kismet]]></category>
		<category><![CDATA[Raspberry Pi]]></category>
		<category><![CDATA[Siddhi]]></category>
		<guid isPermaLink="false">http://holisticsecurity.wordpress.com/?p=1667</guid>

					<description><![CDATA[In my 4 previous blog post I explained each part of this Proof-of-concept, they are: Analysing Wireless traffic in real time with WSO2 BAM, Apache Cassandra, Complex Event Processor (CEP Siddhi), Apache Thrift and Python: Part I (http://wp.me/p8pPj-pE) Part II<span class="ellipsis">&#8230;</span><div class="read-more"><a href="https://holisticsecurity.wordpress.com/2016/03/09/running-multi-container-wso2-bam-mac-address-lookup-docker-application-using-docker-compose/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
		
					<wfw:commentRss>https://holisticsecurity.wordpress.com/2016/03/09/running-multi-container-wso2-bam-mac-address-lookup-docker-application-using-docker-compose/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content url="https://2.gravatar.com/avatar/87dc834d24fa9c1a310815b2677848102c67691917bde186627161f7a4404e97?s=96&#38;d=https%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">rrmmccee</media:title>
		</media:content>

		<media:content url="https://raw.githubusercontent.com/chilcano/docker-wso2bam-kismet-poc/master/chilcano-wso2bam-cep-siddhi-wifi-kismet-thrift-cassandra-docker-compose.png" medium="image">
			<media:title type="html">802.11 traffic capture PoC - Docker Compose</media:title>
		</media:content>

		<media:content url="https://raw.githubusercontent.com/chilcano/docker-wso2bam-kismet-poc/master/chilcano-wso2bam-wifi-thrift-cassandra-5-kismet-toolbox-docker-manuf.png" medium="image">
			<media:title type="html">Visualising 802.11 captured traffic with the MAC Address Manufacturer</media:title>
		</media:content>
	</item>
		<item>
		<title>A MAC Address Manufacturer DB and RESTful Python Microservice in a Docker Container</title>
		<link>https://holisticsecurity.wordpress.com/2016/03/04/mac-address-manufacturer-restful-python-microservice-docker/</link>
					<comments>https://holisticsecurity.wordpress.com/2016/03/04/mac-address-manufacturer-restful-python-microservice-docker/#respond</comments>
		
		<dc:creator><![CDATA[RRMMCCEE]]></dc:creator>
		<pubDate>Fri, 04 Mar 2016 11:06:14 +0000</pubDate>
				<category><![CDATA[BAM]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Microservices]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[SOA]]></category>
		<category><![CDATA[Docker]]></category>
		<category><![CDATA[Flask]]></category>
		<category><![CDATA[Kismet]]></category>
		<category><![CDATA[Python]]></category>
		<category><![CDATA[WSO2]]></category>
		<guid isPermaLink="false">http://holisticsecurity.wordpress.com/?p=1654</guid>

					<description><![CDATA[A MAC address, also called physical address, is a unique identifier assigned to every network interfaces for communications on the physical network segment. In other words, you can identify the manufacturer of your device through your pyshical address. There are<span class="ellipsis">&#8230;</span><div class="read-more"><a href="https://holisticsecurity.wordpress.com/2016/03/04/mac-address-manufacturer-restful-python-microservice-docker/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
		
					<wfw:commentRss>https://holisticsecurity.wordpress.com/2016/03/04/mac-address-manufacturer-restful-python-microservice-docker/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content url="https://2.gravatar.com/avatar/87dc834d24fa9c1a310815b2677848102c67691917bde186627161f7a4404e97?s=96&#38;d=https%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">rrmmccee</media:title>
		</media:content>

		<media:content url="https://raw.githubusercontent.com/chilcano/docker-mac-address-manuf-lookup/master/chilcano_docker_microservice_mac_address_manuf_lookup_2.png" medium="image">
			<media:title type="html">The MAC Address Manufacturer Lookup Docker Container</media:title>
		</media:content>

		<media:content url="https://raw.githubusercontent.com/chilcano/wso2bam-wifi-thrift-cassandra-poc/master/chilcano-wso2bam-wifi-thrift-cassandra-4-kismet.png" medium="image">
			<media:title type="html">Visualizing Captured WIFI Traffic in Realtime</media:title>
		</media:content>
	</item>
		<item>
		<title>Wardriving with WIFI Pineapple Nano in Mobile World Congress 2016 at Barcelona</title>
		<link>https://holisticsecurity.wordpress.com/2016/02/27/wardriving-wifi-pineapple-nano-mobile-world-congress-2016-barcelona/</link>
					<comments>https://holisticsecurity.wordpress.com/2016/02/27/wardriving-wifi-pineapple-nano-mobile-world-congress-2016-barcelona/#comments</comments>
		
		<dc:creator><![CDATA[RRMMCCEE]]></dc:creator>
		<pubDate>Sat, 27 Feb 2016 12:27:02 +0000</pubDate>
				<category><![CDATA[Big Data]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Open Source]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[OpenWRT]]></category>
		<category><![CDATA[Pineapple]]></category>
		<category><![CDATA[Wardriving]]></category>
		<guid isPermaLink="false">http://holisticsecurity.wordpress.com/?p=1633</guid>

					<description><![CDATA[WIFI Pineapple Nano is a nice tiny device to do Wireless Security Auditing. It has OpenWRT embedded as S.O. with 2 Wireless NIC pre-configured and a lot of Security tools pre-installed ready to perform a Security Wireless Auditing. For further<span class="ellipsis">&#8230;</span><div class="read-more"><a href="https://holisticsecurity.wordpress.com/2016/02/27/wardriving-wifi-pineapple-nano-mobile-world-congress-2016-barcelona/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
		
					<wfw:commentRss>https://holisticsecurity.wordpress.com/2016/02/27/wardriving-wifi-pineapple-nano-mobile-world-congress-2016-barcelona/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		
		<media:thumbnail url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/02/chilcano-00-android-gps-kismet-pineapple-adb.png" />
		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/02/chilcano-00-android-gps-kismet-pineapple-adb.png" medium="image">
			<media:title type="html">chilcano-00-android-gps-kismet-pineapple-adb</media:title>
		</media:content>

		<media:content url="https://2.gravatar.com/avatar/87dc834d24fa9c1a310815b2677848102c67691917bde186627161f7a4404e97?s=96&#38;d=https%3A%2F%2F2.gravatar.com%2Favatar%2Fad516503a11cd5ca435acc9bb6523536%3Fs%3D96" medium="image">
			<media:title type="html">rrmmccee</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/02/blog-chilcano-01-android-mobile-pineapple-kismet.png" medium="image">
			<media:title type="html">The arsenal</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/02/blog-chilcano-02-config-1-connect-pineapple-wp6.png" medium="image">
			<media:title type="html">Pineapple Nano - The wp6.sh script</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/02/blog-chilcano-03-1-small-android-share-gps.png" medium="image">
			<media:title type="html">Step 1</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/02/blog-chilcano-03-2-small-android-share-gps.png" medium="image">
			<media:title type="html">Step 1</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/02/blog-chilcano-03-3-small-android-share-gps.png" medium="image">
			<media:title type="html">Step 1</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/02/blog-chilcano-03-4-small-android-share-gps.png" medium="image">
			<media:title type="html">Step 1</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/02/blog-chilcano-04-1-small-screenshot-kismet-in-action.png" medium="image">
			<media:title type="html">Kismet in action</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/02/blog-chilcano-04-2-small-screenshot-kismet-693-networks.png" medium="image">
			<media:title type="html">693 Wireless Networks indentified</media:title>
		</media:content>

		<media:content url="https://holisticsecurity.wordpress.com/wp-content/uploads/2016/02/blog-chilcano-04-3-small-screenshot-kismet-rogue-ap.png" medium="image">
			<media:title type="html">Ops!, A rogue AP?</media:title>
		</media:content>
	</item>
	</channel>
</rss>
