Admin

A Comprehensive Look at Opensource Database Security Concerns

September 22, 2020 0

In the computer age, data is wealth, but when stored in databases it is prone to various kinds of vulnerabilities like SQL injections, abuse of

Wfuzz: Protect Your Web Application by Finding the Faults In It

August 31, 2020 0

Protecting data, especially sensitive information on websites, is extremely essential as users expect their data to be secure. Brute forcing directories, paths, files or even

Efficient Log Management with Fluent Bit

August 28, 2020 0

According to the official documentation, Fluent Bit is an open source, multi-platform log processor and forwarder that allows a user to collect data and logs

Install WordPress from Scratch on a Server Using LEMP

August 27, 2020 0

This article provides an overview of WordPress. It also includes an in-depth tutorial on the installation of Nginx, MySQL and PHP-FPM, as well as how

Kerberos: The Trusted Watchdog of Distributed Computing

August 26, 2020 0

Kerberos is an open source authentication and single sign-on protocol widely used in the computing industry. This article gives a basic overview of the protocol.

The Benefits of Using Terraform as a Tool for Infrastructure-as-Code (IaC)

July 23, 2020 0

DevOps tools have enabled software engineers to deploy application source code in a better way. Including Infrastructure-as-Code (IaC) in the DevOps cycle helps the transition

A Headless CMS: Delivering Pure Content in the Age of Mobile-first Internet

July 22, 2020 0

A headless CMS (content management system) is a back-end-only version built from the ground up as a content repository that makes content accessible via a

Tools that Help to Secure and Monitor Infrastructure as a Service

June 13, 2020 0

Due to its many advantages and conveniences, cloud computing has become the norm rather than the exception for enterprises. In such a scenario, the security

Popular Performance Monitoring Tools for Container Technology

May 1, 2020 0

Containers as microservice-based technology have a significant role in virtualising cloud applications. This article takes a quick look at the most popular performance monitoring tools

Exploring the Snort Intrusion Detection System

April 30, 2020 0

Modern enterprises need IT for smooth and efficient functioning. The almost universal use of the Internet has spawned many bad actors and malicious agents. There

1 2 3 13