anjanj.hashnode.dev·Apr 16, 2024Setting up PostgreSQL with Django App using Docker ComposeIn this article, I delve into the practical aspects of integrating PostgreSQL with Django app using Docker Compose. For those seeking an alternative to MySQL, PostgreSQL offers robust data management capabilities through its relational database manag...Discuss·36 readsPostgreSQL
anjanj.hashnode.dev·Apr 15, 2024Dockerize a Python Django AppIf you're ready to dive into web development using Python, you're in the right place! In this guide, I'll walk you through setting up your development environment and Dockerizing your Django application. But first, let's ensure you have everything yo...Discuss·56 readsDocker
Matias MartinezforBlog de CloudAcademyblog.cloudacademy.ar·Apr 14, 2024Explorando Key Pairs en AWS: Gestión Segura de Acceso a Instancias EC2En el entorno de Amazon Web Services (AWS), las Key Pairs son una parte fundamental de la seguridad de las instancias EC2. En este artículo, exploraremos en detalle qué son las Key Pairs, sus beneficios, en qué servicios de AWS se utilizan, cómo crea...DiscussAWSAWS
BoatbuilderProboatbuilder.hashnode.dev·Apr 12, 2024Get Instant Secure Terminal Access to Any Machine Without Keys Or PasswordsIn the world of high-performance computing, efficiently accessing remote machines and a terminal is crucial for developers. The traditional approach here is to setup SSH and all the cloud VMs comes with SSH built in. However, it comes with challenges...Discussremote ssh
The CyberShield Chroniclescyberinsights.hashnode.dev·Apr 10, 2024JiaTansSSHAgent: Replicating XZ Utils Backdoor for Enhanced SSH Access and Security BypassThreat Analysis On April 9, 2024, GitHub user blasty, known as @bl4sty on X (previously Twitter), released JiaTansSSHAgent, an SSH agent tool that mimics some functions of the XZ Utils backdoor. This backdoor arose from the insertion of malicious cod...Discuss·36 readsGitHub
kandarp gautamblog.kandycan.in·Apr 9, 2024Connect to a remote system using RDP or SSH in 5 simple stepsHello, It's Kandy Here. While humans are actively welcoming Industry 4.0, We will be seeing a major shift in work culture all around the world. The world is more dependent on technology, especially the cloud infrastructure provided by top companies s...Discussssh
Jilvin Thomas Abrahamjilvinabraham.hashnode.dev·Apr 1, 2024Unlocking Secure Access: Connecting to Your Privately Hosted Resources with SSH and SSH TunnelingIntroduction In today's interconnected world, accessing privately hosted resources securely is paramount for businesses and individuals alike. Fortunately, with the power of SSH (Secure Shell) and SSH tunneling, you can establish secure connections t...Discuss·3 likesDevops
Code Skycodesky.cloudhero.in·Mar 29, 2024Exploring Privacy and Security: Comparing SSL Certificates to P.O. BoxesIn today's digital age, privacy and security are paramount concerns for individuals and businesses alike. Whether it's protecting sensitive information online or safeguarding physical mail, finding reliable methods to ensure privacy and security is e...DiscussPOBox
Vincent Kovincentko.hashnode.dev·Mar 23, 2024Troubleshooting Guide for SSH Password-less LoginUnder normal circumstances, by following the key pair, and adding the public key to the remote server's ~/.ssh/authorized_keys, you can achieve password-less login. However, there may be unexpected situations. Recently, I encountered an issue where e...Discussssh-keys
Karlygash Yakiyayevakarlygash-yakiyayeva.dev·Mar 18, 2024Public Key Authentication in LinuxThe motivation for using public key authentication over simple passwords is security. Public key authentication provides cryptographic strength that even extremely long passwords can not offer. With SSH, public key authentication improves security co...DiscussLinuxDevops