#readwise # Linux Fundamentals - Containerization ![rw-book-cover](https://readwise-assets.s3.amazonaws.com/static/images/article2.74d541386bbf.png) ## Metadata - Author: [[Hack The Box]] - Full Title: Linux Fundamentals - Containerization - URL: https://academy.hackthebox.com/module/18/section/2097 ## Summary Containerization is the process of packaging applications in isolated environments called containers, allowing them to run consistently across different systems. It uses technologies like Docker and Linux Containers (LXC), which are lightweight and share the host system's kernel. Containers enhance security and efficiency, making it easier to deploy and manage applications. They encapsulate everything needed for the application, ensuring it works the same in development, testing, and production. ## Highlights Containerization is the process of packaging and running applications in isolated environments, typically referred to as containers. These containers provide lightweight, consistent environments for applications to run, ensuring that they behave the same way, regardless of where they are deployed. Technologies like Docker, Docker Compose, and Linux Containers (LXC) make containerization possible, primarily in Linux-based systems. Containers differ from virtual machines in that they share the host system's kernel, making them far more lightweight and efficient. With these technologies, users can quickly create, deploy, and manage applications with improved security, portability, and scalability. Containers are highly configurable, allowing users to tailor them to their specific needs, and their lightweight nature makes it easy to run multiple containers simultaneously on the same host system. This feature is particularly advantageous for scaling applications and managing complex microservice architectures. ([View Highlight](https://read.readwise.io/read/01jn1m22c89k2e3a0p6shnxtbh)) --- Security is a critical aspect of containerization. Containers isolate applications from the host system and from each other, providing a barrier that reduces the risk of malicious activities affecting the host or other containers. This isolation, along with proper configuration and hardening techniques, adds an additional layer of security. However, it's important to note that containers do not offer the same level of isolation as traditional virtual machines. If not properly managed, vulnerabilities such as privilege escalation or container escapes can be exploited to gain unauthorized access to the host system or other containers. ([View Highlight](https://read.readwise.io/read/01jn1m45j4eddmre8xnd0fzy6p)) ---