How to make nginx secure

TL; DR: Absolutely stable systems don't exist, so the answer is no way. But you…


AWS Cloud Core Concepts

AWS is the largest cloud service provider. Common cloud services include…


Web Vulnerabilities Playground

This article describes the process of creating a test environment for studying…


Development of telecommunications: main trends in the era of the annoying pandemic

On October 28, France went into self-isolation, and Germany did the same, just…


MySQL Encryption Using the Master Key

In this article, we'll look at how the master key is used and discuss the pros…


Microsoft introduced Azure Defender - a network security solution for IoT-devices

Microsoft has introduced a new Azure-based security solution to protect smart…


Where do malwares live: hacker infrastructure and criminal services

All online businesses need a stable and reliable infrastructure. The most…


GitOps: another buzzword or a breakthrough in automation?

Most of us, noticing another new term in the IT blogosphere or conferences,…