Tag: Servers
-
How a Man-in-the-Middle attack works
Posted on May 22, 2022, Level beginner Resource Length medium
Man-in-the-middle (or MitM) attacks can occur when an attacker has the ability to intercept communications over the network. This allows the attacker to read -- and potentially modify -- these communications. By Rob Behnke.
Tags ssl servers infosec web-development app-development
-
NGINX tutorial: Reduce Kubernetes latency with autoscaling
Posted on March 20, 2022, Level beginner Resource Length medium
Your organization built an app in Kubernetes and now it's getting popular! You went from just a few visitors to hundreds (and sometimes thousands) per day. But there's a problem... he increased traffic is hitting a bottleneck, causing latency and timeouts for your customers. If you can't improve the experience, people will stop using the app. By Daniele Polencic of learnk8s.
Tags nginx kubernetes containers devops servers
-
A complete guide to distributed tracing
Posted on March 18, 2022, Level beginner Resource Length medium
Distributed tracing helps you track requests across services and understand issues affecting your application performance. In distributed cloud architecture, debugging performance issues is complicated. By Ankit Anand.
Tags cloud programming agile monitoring web-development servers performance
-
An introduction to the Azure DevOps toolset
Posted on February 19, 2022, Level intermediate Resource Length medium
In this post, we start to delve into DevOps toolsets, specifically Microsoft Azure DevOps Services. This is the third in a series of blog posts about DevOps. By Ron Callahan.
Tags azure cloud cicd devops kubernetes servers
-
How does an SQL injection attack work? Examples & types
Posted on December 6, 2021, Level intermediate Resource Length medium
A SQL injection (SQLi) attack is one of the most threatening issues for data integrity and confidentiality today, allowing attackers to access secure data where they are not authorized. In this article, we discuss SQLi and how these attacks work, with types and examples. By Al Mahmud Al Mamun.
Tags servers mysql database miscellaneous cloud cio distributed
-
How much has Quantum Computing actually advanced?
Posted on December 3, 2021, Level beginner Resource Length medium
Lately, it seems as though the path to quantum computing has more milestones than there are miles. Judging by headlines, each week holds another big announcement—an advance in qubit size, or another record-breaking investment. This is Q&A with the former chief architect of Google's Sycamore, John MartinisBy Dan Garisto.
Tags machine-learning big-data cloud servers distributed
-
Comparing the best web servers: Caddy, Apache, and Nginx
Posted on October 23, 2021, Level intermediate Resource Length medium
A web server is a piece of software that accepts a network request from a user agent, typically a web browser, and returns either the appropriate response for the request or an error message. Two dominant solutions for HTTP servers today are Apache and Nginx. However, a new player in the space, Caddy Web Server, is gaining traction for its ease of use. By Ayooluwa Isaiah.
Tags servers devops microservices app-development apache nginx
-
Influencing ingress BGP routing using communities and local preference
Posted on October 19, 2021, Level advanced Resource Length long
Border Gateway Protocol (BGP) is an enormous protocol with a nearly endless list of features, knobs and capabilities. BGP's mechanism for choosing the best path is complex but also well known. You should brush up on that algorithm if you're out of practice. By Nicholas Russo.
Tags infosec servers linux devops cio
-
SSH tunneling explained
Posted on October 18, 2021, Level beginner Resource Length medium
In this post author will cover different tunneling features as supported by OpenSSH, which helps achieve security use cases such as remote web service access without exposing port on the internet, accessing server behind NAT, exposing local port to the internet. OpenSSH is the most widely used open-source SSH server. It comes pre-installed by default with the vast majority of Linux distributions. By Sakshyam Shah.
Tags infosec servers open-source linux app-development
-
How to create a self-signed SSL certificate for Nginx in Ubuntu 20.04
Posted on September 24, 2021, Level intermediate Resource Length long
TLS, or transport layer security, and its predecessor SSL, which stands for secure sockets layer, are web protocols used to protect and encrypt traffic over a computer network. By Brian Boucheron and Jeanelle Horcasitas.
Tags nginx servers infosec linux ssl app-development
-
Defenseless: UVA engineering computer scientists discover vulnerability affecting computers globally
Posted on May 7, 2021, Level beginner Resource Length medium
In 2018, industry and academic researchers revealed a potentially devastating hardware flaw that made computers and other devices worldwide vulnerable to attack. Since Spectre was discovered, the world's most talented computer scientists from industry and academia have worked on software patches and hardware defenses, confident they've been able to protect the most vulnerable points in the speculative execution process without slowing down computing speeds too much. By Audra Book @virginia.edu.
Tags infosec management cio miscellaneous software linux servers crypto
-
Trapped on technology's trailing edge
Posted on April 20, 2021, Level beginner Resource Length long
We're paying too much to deal with obsolete electronic parts. Keeping aging systems on their feet is a daunting and resource-intensive task. By Peter Sandborn.
Tags miscellaneous servers cio management performance