Security Controls

What is Cryptography in network security? Type of Cryptography.

Reading Time: 4 minutes Cryptography is the study of security over communication between senders and receivers message so that only right recipient can get the message and processed it

Introduction To Ansible Vault

Reading Time: 2 minutes Hi readers, in this blog we will be discussing Ansible vault. Also, we will be looking at how to encrypt different playbooks and how they can be decrypted. Introduction The “Vault” is a feature of Ansible that allows you to keep sensitive data such as passwords or keys protected at rest, rather than as plain text in playbooks or roles.  Why use Ansible Vault? Ansible Continue Reading

Data Lake – Build it in Phases

Reading Time: 3 minutes Data Lake – How to build a data lake and what are the phases involved in the same.

API Security in Apigee: Introduction to OAuth 2.0

Reading Time: 3 minutes In today’s world of web APIs How you can control access to your APIs from malicious attacks? How you can build a trustworthy system?

Configuring SSH Key Authentication on Linux

Reading Time: 3 minutes Now Days it is very convenient to use Remote Desktop Protocol(RDP) for accessing remote system over Internet, specially server systems(either client to server or server to server), although it is very convenient and easy way to access remote systems but it may cause big loss as it may provide an opportunity for remote attackers to guess logon credentials of client. There may present many ways Continue Reading

Knolx – Intoduction to AWS IAM

Reading Time: < 1 minute Hi all, Knoldus has organized a 30 min session on 3rd March 2017 at 4:50 PM. The topic was Introduction to AWS IAM. Many people have joined and enjoyed the session. I am going to share the slides here. Please let me know if you have any question related to linked slides.    

Handling HTTPS requests with Akka-HTTPS Server

Reading Time: 2 minutes Hi guys, In my last blogs I explained how one can create a self-signed certificate and KeyStore in PKCS12. You can go through the previous blog, as we’ll be needing certificate and keystore  for handling HTTPS requests. https://blog.knoldus.com/2016/10/18/create-a-self-signed-ssl-certificate-using-openssl/ https://blog.knoldus.com/2016/10/26/how-to-create-a-keystore-in-pkcs12-format/ Akka-HTTP provides both Server-Side and Client-Side HTTPS support. In this blog I’ll be covering the Server-Side HTTPS support. Let’s start with “why do we need server-side HTTPS support?” If we want the communication between the browser and Continue Reading

How to create a KeyStore in PKCS12 Format.

Reading Time: 2 minutes In my last blog I explained how to create a self-signed SSL certificate. You can go through the previous blog and generate the certificate and private key as we’ll be needing it for creating a KeyStore. Create a self-signed SSL Certificate using OpenSSL. In this blog I’ll be explaining how one can create a KeyStore in PKCS12 Format using OpenSSL. Let’s start with “What is Continue Reading

How to build secure Web Application

Reading Time: 4 minutes We all use web applications everyday whether we consciously know it or not. That is, all of us who browse the web. Now a days we have seen a significant surge in the amount of web application specific vulnerabilities that are disclosed to the public. No web application technology has shown itself invulnerable, and discoveries are made every day that affect both owners and users security and privacy. Security Continue Reading