Shubham Mukherjeeshubhammukherji.hashnode.dev·Apr 25, 2024End to End DevSecOps Project for DevOps EngineersIntroduction In today's fast-paced software development landscape, ensuring the security and efficiency of our code deployment processes is paramount. The integration of DevOps and security practices, known as DevSecOps, is gaining prominence as orga...DiscussDevops
Sergio Medeirosgrumpz.net·Apr 22, 2024Uncovering an SSRF Vulnerability in PDFMyURL Affecting Numerous UsersWhile enumerating the scope of a target on a private bug bounty program, I came across a subdomain used for generating PDF files. However, it seemed out-of-scope as they were simply white labeling a service called PDFMyURL, which lets you convert any...Discuss·10 likes·641 readsMy Security Researchbugbounty
Yashaswi Tiwariyashaswiyeezy.hashnode.dev·Apr 20, 2024Enhancing Real-Time Communication with ChatApp and Streamlined CI/CD PipelinesChatApp: A Closer Look At the heart of ChatApp lies a powerful combination of technologies, including Express, Socket.io, and HTTP, all working together to create a seamless chatting experience. The setup process is simple and straightforward, allowi...DiscussJenkins
Sarang Deshpandesarangcharthankar.hashnode.dev·Apr 20, 2024The Crucial Dance of Frontend and Backend Validations in Application SecurityIn the world of web development, data is king. It fuels our applications, allows for user interaction, and ultimately determines the success of our creations. But just like a king needs loyal guards to protect his castle, our data needs robust valida...Discussdevina
pardeep kaurpardeepkaur.hashnode.dev·Apr 13, 2024Automating Tetris Deployments with ArgoCD, Terraform, Kubernetes, Docker and Jenkins CICDIn our project, we leverage DevOps practices to streamline collaboration between development and operations teams, ensuring faster software delivery through continuous integration and deployment. With Terraform, we define and provision infrastructure...Discuss·56 readsJenkins
Michaelmichaelhabra.hashnode.dev·Apr 12, 2024Denial of Service Dos & Distributed Denial of Service DDosAn attacker can generate sufficient traffic to starve your server of resources, they can make deny service to legitimate users. Denial-of-service attacks are designed to make a site unavailable to regular users. In a DoS attack, a single computer or...Discussdos attack
Vivek Ashok Moudekarvivek0007.hashnode.dev·Apr 7, 2024👩🔧Embracing DevSecOps: Automating Security in Continuous Integration and Deployment📍Prerequisite AWS EC2 VM : We will be Using Amazon Machine Image As Ubuntu. GitHub : we will Bring our code from a github repo where we have pushed the code. Jenkins : Jenkins CI/CD is an automation server used for continuous integration and continu...Discuss·12 likes·105 readsDevSecOps
Akshay Shindeakshayshinde9.hashnode.dev·Apr 3, 2024Project : 03Name of Project: DevSecOps Jenkins CICD Pipeline for a Node.js Application : Full Guide In this project we will create our Node.js application using Jenkins, security using SonarQube,OWASP, image Tool we will need in this project is :- AWS EC2 Doc...Discuss·37 readsDevops articles
Shubham Asgaonkarshubhamasgaonkar.hashnode.dev·Apr 1, 2024Project: Deploying WebApp on Azure using DevOpsProject Details: https://www.canva.com/design/DAGA_LqX_kY/IEe7s-THOwTUZpIC1f_3Xg/edit?utm_content=DAGA_LqX_kY&utm_campaign=designshare&utm_medium=link2&utm_source=sharebutton Architecture Deployment Procedures Part 1: Deployment of Linux vm which ...Discuss·1 likeDevops
Stanislav Deviatovstn1slv.hashnode.dev·Apr 1, 2024Integration Digest: March 2024Articles 🔍 API Contracts - an Extended Introduction This article emphasizes the crucial role of API contracts in system integration, secure interaction, and detailing data formats and constraints. It further underscores the importance of complete do...Discussmicrocks