uptimejournal.blogSecuring Container Images: A Deep Dive into Best Practices and Scanning TechniquesIntroduction Containers have become the de facto standard for deploying applications. With Containers you don’t have to worry about platform, dependencies or environment, a container image can take care of all of them making them the ultimate artefac...Mar 6, 2025·5 min read
ghanatava.hashnode.devDemystifying the IPTABLES NAT Table: A Comprehensive GuideBefore you begin I would recommend that you have at least the fundamental knowledge of networking including but not limited to tcp/ip protocol, NAT, IP Packets and how networks work. Introduction The linux-kernel has it is own network processing subs...Jul 27, 2024·6 min read
ghanatava.hashnode.devUnderstanding Docker Networks: A Beginner's TutorialCONTENTS: Introduction Building our custom image Creating a custom network Connecting two custom networks Introduction Firstly we need to be a little familiar with the docker networks. Docker connects freshly created containers to a default net...Jul 18, 2024·6 min read
ghanatava.hashnode.devHow to Use rsync for Linux Server BackupsIntroduction to rsync rsync is a utility for transferring and synchronising files between a computer and a storage drive and across networked computers by comparing the modification times and sizes of files. We will use rsync for creating backups at ...Jul 16, 2024·4 min read
ghanatava.hashnode.devUnderstanding ACID Properties in Databases: A Comprehensive GuideCONTENTS: What is a transaction? Lifespan of a Transaction Nature of transaction Atomicity Isolation Dirty Reads Non-Repeatable Reads Phantom Reads Lost Updates Read Committed Repeatable Reads Snapshot Serializable Consistency Consis...Jun 27, 2024·10 min read