Logs collection and parsing using Filebeat

The purpose of the tutorial: To organize the collection and parsing of log…


How to make nginx secure

TL; DR: Absolutely stable systems don't exist, so the answer is no way. But you…


AWS Cloud Core Concepts

AWS is the largest cloud service provider. Common cloud services include…


Web Vulnerabilities Playground

This article describes the process of creating a test environment for studying…


Development of telecommunications: main trends in the era of the annoying pandemic

On October 28, France went into self-isolation, and Germany did the same, just…


MySQL Encryption Using the Master Key

In this article, we'll look at how the master key is used and discuss the pros…


Microsoft introduced Azure Defender - a network security solution for IoT-devices

Microsoft has introduced a new Azure-based security solution to protect smart…


Where do malwares live: hacker infrastructure and criminal services

All online businesses need a stable and reliable infrastructure. The most…