David G. Simmonsedgeiot.hashnode.dev·Nov 18, 2024Integrating an LTE Cell Modem with Zymbit Secure Edge NodeThis How To Guide will show you how to integrate an LTE Cell Modem card with a Zymbit Secure Edge Node Developer Kit. The Goals is to be able to get your Zymbit Secure Edge Node Developer Kit to come up with an alternative data path provided by the L...Discuss·86 readsRaspberry Pi
Shivam Dubeycloud-journey.hashnode.dev·Nov 14, 2024A Step-by-Step Guide to Create IAM Users for BeginnersIf you are new to AWS, one of the first things you should learn is how to manage access to your AWS resources securely. AWS Identity and Access Management (IAM) helps you control who can access your AWS environment. In this guide, we will walk you th...Discusssecure iam
Romman Sabbirrommansabbir.com·Oct 27, 2024Android Security Approaches: Encryption and Secure PracticesIn this article, we explore essential security techniques and encryption methods to protect Android applications. Covering a broad spectrum of security approaches, we highlight the use of data encryption (AES, RSA, and Android KeyStore), secure user ...Discuss·91 readsAndroid : Security, Encryption and Secure Practicesapproaches
Utkarsh Jaiswalreadwithutkarsh.hashnode.dev·Oct 19, 2024Protecting Your API with Unkey: A Guide to API Security and Rate LimitingAPIs are the backbone of modern applications, for seamless communication between different services.However, securing these APIs is crucial to prevent unauthorized access and abuse. Unkey offers a simple yet powerful solution for protecting APIs with...Discuss·1 like·65 readssafe api
Nysa Guptanysaa.hashnode.dev·Oct 13, 2024OSINT: The Digital Detective Work You Didn’t Know You Were DoingSearching for someone online can uncover a surprising amount of information, whether you’re curious about a potential employer, a friend’s mysterious new acquaintance, or even your own digital footprint. Open Source Intelligence (OSINT) is exactly wh...Discuss·16 likescybersecurity
Nikunj Vaishnavdevcloudjourney.hashnode.dev·Aug 8, 2024How to Secure Your AWS Cloud EnvironmentIn today's digital world, securing your cloud environment is more important than ever. AWS (Amazon Web Services) is a popular cloud service provider, but just using AWS doesn't automatically make your data secure. Here are some simple, actionable ste...DiscussAWS CloudAWS
John Vesterjohnjvester.hashnode.dev·May 28, 2024Less Time Learning, More Time BuildingBack in 2018, I decided to use my free time to help modernize a family member’s business. Along the way, I wanted to gain some experience and understanding of AWS. Ultimately, I discovered that nearly all my free time was spent learning AWS cloud inf...DiscussPrivate Space
Abraham Dominic Newtonabrahamdominic.hashnode.dev·Apr 22, 2024Leveling Up: Blockchain and Gaming's Thrilling AllianceIntroduction: In the dynamic world of technology, where innovation is the name of the game, blockchain is making waves that extend far beyond cryptocurrencies. One particularly exciting frontier is the intersection of blockchain and gaming, a space w...DiscussTransprency
Michael QuigleyforOpenZiti Tech Blogblog.openziti.io·Mar 20, 2024The zrok SOCKS Backendzrok provides a number of powerful tools for sharing private resources. In addition to our multiple flavors of proxy support, web hosting, low level TCP and UDP sharing, and network drives support, zrok now includes the ability to hide or alter your ...Discuss·768 readszrokzrok
Mohamed Ismail Sihssmaheel.hashnode.dev·Mar 16, 2024Shielding Your Data: AES-GCM Encryption & Decryption for JavaScript, TypeScript, Java, and Python 🛡️🔐Hey There, 👋 Awesome Developers! 🚀 Today, let's explore the AES-GCM encryption and decryption with code examples in JS, TS, Java and Python. If you're eager to enhance your data protection skills! 👇 Let's get started! Introduction 🚀 Ever felt wor...DiscussJavaScript