Is it dangerous to keep RDP open on the Internet?
Often I read the opinion that keeping the RDP (Remote Desktop Protocol) port…
Web Application Firewall Evolution
In our previous cloud-based material, we talked about how to protect IT…
Nginx-log-collector utility to send nginx logs to Clickhouse
This article will discuss the nginx-log-collector project, which will read…
How to make Windows Server safer
In this article, I would like to give a couple of good tips on administering…
How to make a multi-tenant application out of a non-tenant
It happens that the application is initially developed for installation only on…
Kubernetes: why is it so important to set up system resource management?
As a rule, there is always a need to provide a dedicated pool of resources to…
Transferring SEQUENCE values between PostgreSQL databases
How can I transfer to the other PostgreSQL database the last assigned value of…
What is a Penetration Test?
In Penetration testing we conduct a series of activities, which help you to…