Quick Guide to Docker

Here is a quick guide to using Docker. See also:

From: https://docs.docker.com/docker-for-windows/#docker-settings-dialog 

Printing the version

docker --version

Testing the installation

docker run hello-world

Listing the images

docker image ls

Listing all the containers

docker container ls --all

Other help

> docker --help
> docker container --help
> docker container ls --help
> docker run --help

Pull an image of the Ubuntu OS and run an interactive terminal inside the spawned container:

docker run --interactive --tty ubuntu bash

Pull and run a Dockerized nginx web server that we name, webserver:

docker run --detach --publish 80:80 --name webserver nginx

You can now point your browser to http://localhost and see that the nginx welcome page is loaded.

List only your running containers:

docker container ls

Stop the running nginx container by the name we assigned it, webserver:

docker container stop webserver

Start a container that was stopped/exited previously:

docker start webserver

Attached to a running container, webserver:

docker attach webserver

Exit from an interactive session of a container, webserver without stopping it:

Press CTRL-P followed by CTRL-Q

Remove all  containers by its name:

docker container rm webserver 

The following common starts an interactive ash command line session for the docker image alpine-npm, maps the internal port 3000 to the host port 3000, set the number of cpus allocated to 10, gives it a name “react”, and automatically removes the image upon exit:

docker run -p 3000:3000 -cpus 10 -it --name react --rm alpine-npm /bin/ash

See the following page on how to display applications onto your Windows 10.

https://dev.to/darksmile92/run-gui-app-in-linux-docker-container-on-windows-host-4kde

Half of Audited JavaScript Projects Contained a Vulnerability

Since April, according to the company, npm users have run 50 million automatic scans and have deliberately invoked the command 3.1 million times. And they’re running 3.4 million security audits a week. Across all audits, 51 per cent found at least one vulnerability and 11 per cent identified a critical vulnerability. In a phone interview with The Register, Adam Baldwin, head of security at NPM, said he didn’t have data on how many people are choosing to fix flagged flaws. “But what we’ve seen from pull requests suggests it’s gaining traction,” he said.

http://www.slashdot.org/story/345060

Faces Are Being Scanned At US Airports With No Safeguards on Data Use

The Department of Homeland Security is now using the data to track foreigners overstaying their visas, according to the Times. “After passengers’ faces are scanned at the gate, the scan is sent to Customs and Border Protection and linked with other personally identifying data, such as date of birth and passport and flight information.”

But the face scans are collected by independent companies, and Border Protection officials insist they have no control over how that data gets used.

http://www.slashdot.org/story/344530