DevOps Wannabe — if I had to start againLately I was doing an online presentation. I thought that title “50 faces of DevOps Engineer” would be pretty adequate and also…Feb 16Feb 16
SSH keys — configure properly or die tryingPasswords are from the last century, so you have to know how to configure SSH keys in a secure way which is not that obvious in some cases.Feb 7Feb 7
Ransomware — what could possibly go wrong & where is the backup?Ransomware in a nutshell is the type of malware that encrypts all your files on a computer. Pay a ransom and MAYBE you will get your data…Jan 18Jan 18
Operation Duck Hunt — How QakBot malware was taken down by FBI?Qakbot, also known as Oakboat, Pinkslipbot, Qbot, Quakbot, was one of the largest known botnets and has a long story in the world of…Jan 4Jan 4
All you need to know about SSL/TLS certificates — PART 2This is the next article in a series about TLS/SSL certificates. The first one is available to read here:Nov 28, 2023Nov 28, 2023
All you need to know about SSL certificates — PART 1Why you even have to care about this topic? First of all, if you are aspiring to the role of System Administrator, DevOps Engineer, SysOps…Oct 31, 2023Oct 31, 2023
Secure exposing Kubernetes resources to the InternetAs organizations increasingly adopt cloud-based technologies and distributed development workflows, exposing internal resources such as…Oct 19, 2023Oct 19, 2023
Detect ARP spoofing quickly & increase network securityTo gain insights into the underlying protocols and strengthen defenses against attacks like ARP spoofing, several tools are available that…Oct 13, 2023Oct 13, 2023
DevSecOps — how to secure containers using TrivyMaking sure that our contenerized architecture is properly protected is not an easy job. This is one of DevSecOps responsibility to make…Oct 9, 2023Oct 9, 2023
TryHackMe — Intro to Pipeline Automation Q&AAn easy introduction to DevOps pipeline automation and the potential security concerns including all questions and answers in Intro to…Oct 8, 2023Oct 8, 2023