How cloud technologies are changing the world

Some trends in the development of IT technologies clearly hint to us that in…


What is VPN, Proxy, Tor?

Anonymity and privacy are great concepts. But lately there is a feeling that…


The concept of the security perimeter is outdated. But how do you make life harder for hackers?

The need for teamwork in the field of information security did not arise…


5 common developer mistakes that affect website page load time

Did you know that when a website loads for more than three seconds, half of…


Cybersecurity in 2021

In 2019, a survey of 1,200 small business owners was conducted in the United…


What is Linux Sandbox?

The purpose of this article is to show what projects exist today for the…


Logs collection and parsing using Filebeat

The purpose of the tutorial: To organize the collection and parsing of log…


How to make nginx secure

TL; DR: Absolutely stable systems don't exist, so the answer is no way. But you…