Encryption

How to encrypt and decrypt files using GPG

Reading Time: 3 minutes In Linux, you keep your data in form of files. But what if the data you are storing is sensitive. How can you protect that from unauthorized access? One of the ways is encrypting the files using GPG. In this blog, I’ll tell you what GPG is and how you can use it to encrypt and decrypt files in the Linux system. What are GPG Continue Reading

An Introduction to SSH – Secure Shell

Reading Time: 4 minutes What is SSH ? SSH is a network protocol that allows secure connection between different computers. SSH protocol also referred to as Secure Shell, provides many functionalities like, Strong connection and security Strong authentication Maintains connection integrity Strong encryption. In general, there are different ways for logging in to a remote machine, Know the password of that machine. SSH public and private keys. Host-based authentication Continue Reading

Introduction To Ansible Vault

Reading Time: 2 minutes Hi readers, in this blog we will be discussing Ansible vault. Also, we will be looking at how to encrypt different playbooks and how they can be decrypted. Introduction The “Vault” is a feature of Ansible that allows you to keep sensitive data such as passwords or keys protected at rest, rather than as plain text in playbooks or roles.  Why use Ansible Vault? Ansible Continue Reading

Container security

Securing Your Containers with Encryption of Containerized Data

Reading Time: 6 minutes Most of the business applications today are enabled by the cloud with a lot of them residing as containerized workloads. Digital transformation is being powered by concepts encompassing containers, Kubernetes, and microservices and has become indispensable parts of how applications are developed & deployed.  If we take containers particularly in consideration, they are modernizing applications like never before and helping in creating scalable & agile Continue Reading