Is it dangerous to keep RDP open on the Internet?

Often I read the opinion that keeping the RDP (Remote Desktop Protocol) port…


Web Application Firewall Evolution

In our previous cloud-based material, we talked about how to protect IT…


Nginx-log-collector utility to send nginx logs to Clickhouse

This article will discuss the nginx-log-collector project, which will read…


How to make Windows Server safer

In this article, I would like to give a couple of good tips on administering…


How to make a multi-tenant application out of a non-tenant

It happens that the application is initially developed for installation only on…


Kubernetes: why is it so important to set up system resource management?

As a rule, there is always a need to provide a dedicated pool of resources to…


Transferring SEQUENCE values between PostgreSQL databases

How can I transfer to the other PostgreSQL database the last assigned value of…


What is a Penetration Test?

In Penetration testing we conduct a series of activities, which help you to…