Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Dec 5, 2023Securing Your AWS S3 Buckets: Enforcing Block Public Access with Terragrunt Automation and Step-by-Step Manual GuideOver view:- **#**S3 Block Public Access is a feature in #Amazon S3 that helps prevent public access to S3 buckets and objects. Enabling this feature provides an added layer of #security to protect your data from accidental or intentional exposure. #S...DiscussAWS
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Nov 21, 2023Streamlining Security: Integrating Snyk with CircleCIIntroduction: In today’s fast-paced development landscape, security must be a top priority. Vulnerabilities and issues in your code can lead to disastrous consequences if left unchecked. This is where #Snyk and #CircleCI come into play. #Snyk is a po...DiscussCircleCI
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Oct 20, 2023Securing Your Deployed SNS Topics: Enabling At-Rest Encryption with AWS KMSIntroduction:- In AWS, SNS (Simple Notification Service) provides a scalable and flexible messaging service. To ensure the confidentiality and #security of sensitive data, it is important to encrypt SNS topics at rest. #AWSKeyManagementService (KMS) ...Discusssns
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Oct 20, 2023Secure S3 Bucket Creation and User-Specific Permissions: A Step-by-Step GuideIntroduction :- #Amazon S3 (Simple Storage Service) is a scalable and #secure #cloud storage solution provided by AWS. With S3, you can create buckets to store and #retrieve data objects, and assign permissions to control access to these buckets. In ...DiscussS3
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Oct 19, 2023Creating a New User With an SSH Key on LinuxIntroduction :- In the realm of #secure and efficient system administration, creating new user accounts on #Linux machines is a fundamental task. Adding an extra layer of #security, using #SSH keys for user authentication has become a best practice i...Discussssh-keys
Tomas Rawskirtomas.hashnode.dev·Oct 17, 2023key-kiss (key keep it safe/secure)Problem When I started to get in touch with Crypto, I couldn't believe that the best solution to save your wallet's private key was a paper with 12 words in order. So I have always thought of another way to do it, but none of them were enough secure ...Discuss·83 readswallet
Samarth Mishrablog.samarthmishra.xyz·Jun 29, 2023Safeguarding Against Cybersecurity Attacks and Scams: The Power of CodingIn our interconnected digital world, cybersecurity threats and scams have become increasingly sophisticated, posing a significant risk to individuals, businesses, and governments. The constant evolution of these threats demands proactive measures to ...Discuss#cybersecurity
Albert Gubanjaalbertgubanja.com·Apr 30, 2023Security Features in Windows OSWindows is a popular system. It is designed to be able to meet, with satisfaction, the needs of all its users: professionals, developers, gamers, administrators, etc. The popularity of Windows makes it a prime target for hackers who, ready or indirec...DiscussWindowsWindows
Swarupcloudforall.hashnode.dev·Apr 18, 2023Secure ScoresIn this lab you will get an overview of Secure Scores and learn how to do the following: Log in to the Azure CLI Query Secure Scores and definitions Query alerts Step 1 - Logging In Run this command to log in to the Azure account: az...Discuss·29 readsAzure Security LABAzure
crack winxprotechsoft.hashnode.dev·Mar 28, 2023Folder Lock 8 CrackFolder lock 8 Crack permits to share of encrypted files or personal data on portable devices. If you want to share encrypted files with friends? Then it has you protected. With the help of these instruments, Encrypt files on the fly without any issue...DiscussFolder Structure