How cloud technologies are changing the world
Some trends in the development of IT technologies clearly hint to us that in…
What is VPN, Proxy, Tor?
Anonymity and privacy are great concepts. But lately there is a feeling that…
The concept of the security perimeter is outdated. But how do you make life harder for hackers?
The need for teamwork in the field of information security did not arise…
5 common developer mistakes that affect website page load time
Did you know that when a website loads for more than three seconds, half of…
Logs collection and parsing using Filebeat
The purpose of the tutorial: To organize the collection and parsing of log…
How to make nginx secure
TL; DR: Absolutely stable systems don't exist, so the answer is no way. But you…