18 Weird and Wonderful ways I use Docker



AI Summary

Summary of Docker Usage Video

  1. Run a Web Browser in Docker
    • Use a container from linuxserver.io with Chasm VNC for GUI access.
    • Demonstrates launching a browser inside a container for isolation and security.
  2. Obsidian in Docker
    • Run Obsidian with GUI access using a container from linuxserver.io.
    • Change port mappings to avoid conflicts with other containers.
  3. LibreOffice in Docker
    • Use a container from linuxserver.io to run LibreOffice in a browser.
  4. Folding@Home in Docker
    • Deploy Folding@Home using a container from linuxserver.io.
    • Optional GPU acceleration with NVIDIA container runtime.
  5. Docker Desktop
    • Manage Docker containers with a GUI using Docker Desktop for Mac, Linux, and Windows.
  6. Portainer in Docker Desktop
    • Install Portainer as an extension in Docker Desktop for container management.
  7. Danger Zone
    • Convert potentially dangerous documents into safe PDFs using a container.
  8. Tools in Docker Containers
    • Install tools in separate Docker containers to avoid dependency conflicts.
    • Create Docker images for tools using Dockerfiles.
  9. Docker Scout
    • Analyze Docker images for vulnerabilities and security issues.
  10. Hacking Lab with Docker
    • Set up a hacking lab using Docker containers for Kali Linux and vulnerable machines.
    • Use Docker networks and Docker Compose for lab setup and management.
  11. Trying New Operating Systems
    • Experiment with different Linux distributions and even macOS in Docker containers.
  12. Raspberry Pi in Docker
    • Run Raspbian in a Docker container.
  13. IT Tools in Docker
    • Access a variety of IT tools through a web interface provided by a Docker container.

Detailed Instructions and Tips

  • Use docker run commands to pull and run containers.
  • Change port mappings to avoid conflicts (-p host_port:container_port).
  • Use docker ps to check running containers.
  • Access GUI applications through a web browser by navigating to localhost:port.
  • Use docker network create to set up isolated networks.
  • Use docker compose up -d and docker compose down to manage multiple containers with Docker Compose.
  • Use docker build -t image_name . to create Docker images from Dockerfiles.
  • Use docker scout CLI for image vulnerability analysis.
  • Use Docker Desktop and extensions like Portainer for GUI management of Docker environments.

Additional Notes

  • The video is sponsored by Docker.
  • The author uses WSL 2 on Windows for Docker.
  • The author emphasizes the ease and security benefits of using Docker for various applications.
  • The author encourages ethical hacking and the use of Docker for setting up secure hacking labs.
  • The author showcases the versatility of Docker by running different operating systems and tools within containers.