Utkarsh Jaiswalreadwithutkarsh.hashnode.dev·Oct 19, 2024Protecting Your API with Unkey: A Guide to API Security and Rate LimitingAPIs are the backbone of modern applications, for seamless communication between different services.However, securing these APIs is crucial to prevent unauthorized access and abuse. Unkey offers a simple yet powerful solution for protecting APIs with...Discuss·1 like·60 readssafe api
Nysa Guptanysaa.hashnode.dev·Oct 13, 2024OSINT: The Digital Detective Work You Didn’t Know You Were DoingSearching for someone online can uncover a surprising amount of information, whether you’re curious about a potential employer, a friend’s mysterious new acquaintance, or even your own digital footprint. Open Source Intelligence (OSINT) is exactly wh...Discuss·16 likescybersecurity
Nikunj Vaishnavdevcloudjourney.hashnode.dev·Aug 8, 2024How to Secure Your AWS Cloud EnvironmentIn today's digital world, securing your cloud environment is more important than ever. AWS (Amazon Web Services) is a popular cloud service provider, but just using AWS doesn't automatically make your data secure. Here are some simple, actionable ste...DiscussAWS CloudAWS
John Vesterjohnjvester.hashnode.dev·May 28, 2024Less Time Learning, More Time BuildingBack in 2018, I decided to use my free time to help modernize a family member’s business. Along the way, I wanted to gain some experience and understanding of AWS. Ultimately, I discovered that nearly all my free time was spent learning AWS cloud inf...DiscussPrivate Space
Abraham Dominic NewtonforAbraham Dominic Newtonabrahamdominic.hashnode.dev·Apr 22, 2024Leveling Up: Blockchain and Gaming's Thrilling AllianceIntroduction: In the dynamic world of technology, where innovation is the name of the game, blockchain is making waves that extend far beyond cryptocurrencies. One particularly exciting frontier is the intersection of blockchain and gaming, a space w...DiscussTransprency
Michael QuigleyforOpenZiti Tech Blogblog.openziti.io·Mar 20, 2024The zrok SOCKS Backendzrok provides a number of powerful tools for sharing private resources. In addition to our multiple flavors of proxy support, web hosting, low level TCP and UDP sharing, and network drives support, zrok now includes the ability to hide or alter your ...Discuss·717 readszrokzrok
Mohamed Ismail Sihssmaheel.hashnode.dev·Mar 16, 2024Shielding Your Data: AES-GCM Encryption & Decryption for JavaScript, TypeScript, Java, and Python 🛡️🔐Hey There, 👋 Awesome Developers! 🚀 Today, let's explore the AES-GCM encryption and decryption with code examples in JS, TS, Java and Python. If you're eager to enhance your data protection skills! 👇 Let's get started! Introduction 🚀 Ever felt wor...DiscussJavaScript
Shahi ShreshthforTechLearn Indiablog.techlearnindia.com·Feb 29, 2024Demystifying Crypto: Your Guide to Creating a Blockchain Wallet and Tracking TransactionsBlockchain technology is revolutionizing the way we interact with finance and digital assets. But diving into this new world can feel overwhelming, especially understanding how to store and track your assets. This guide simplifies the process of crea...DiscussBlockchain
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Dec 5, 2023Securing Your AWS S3 Buckets: Enforcing Block Public Access with Terragrunt Automation and Step-by-Step Manual GuideOver view:- #S3 Block Public Access is a feature in #Amazon S3 that helps prevent public access to S3 buckets and objects. Enabling this feature provides an added layer of #security to protect your data from accidental or intentional exposure. #S3 Bl...DiscussAWS
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Nov 21, 2023Streamlining Security: Integrating Snyk with CircleCIIntroduction: In today’s fast-paced development landscape, security must be a top priority. Vulnerabilities and issues in your code can lead to disastrous consequences if left unchecked. This is where #Snyk and #CircleCI come into play. #Snyk is a po...DiscussCircleCI