AWS Cloud Practitioner

Objective Weighting Cloud Concepts 28% Security 24% Technology 36% Billing and Pricing 12% Before exam read the whitepapers Architecting for the Cloud: AWS Best PracticesHow AWS Pricing Works Cloud Computing Renting someone's computing power 6 advantages of Cloud Computing Trade Capital Expense for Variable ExpenseDon't have to invest heavily in data centers and servers before... Continue Reading →

Basics of Cloud Computing & Security

Abstract In recent years, cloud computing has had a significant impact on technology that businesses are attempting to take full advantage of. This paper will discuss why cloud computing is so desirable by businesses and will also discuss the potential security risks that come with it. Once we understand cloud computing and how it works... Continue Reading →

The POODLE Vulnerability

The POODLE Vulnerability Who is infected? “All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 (also known as SSLv3) with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this vulnerability using web browsers and web servers, which is one of the most... Continue Reading →

Get A Password Manager!

Welcome to the 21st century! Remember back in the day when we would write down a password so we wouldn’t have to memorize it? Well let’s do that again! Just this time we are going to do it better. So a password manager is exactly what it sounds like. It is an application used to... Continue Reading →

What’s an SQL Injection?

SQL Injection What is an SQL injection? URL encoding Types of SQL injections How basic SQL injections work   What is an SQL injection? This code injection technique is used to attack data-driven applications. Attackers can insert SQL statements into an entry field on a vulnerable website for execution. A common reason for using this... Continue Reading →

Understanding Graylog and Log Management

Log Management Tools (Graylog) As you probably know by now keeping track of logs and alerts is a crucial part of security. Therefore, having tools that allows administrators to create an efficient way to manage their logs. The tool we are going to discuss in this post is Graylog, but first let’s look at Log... Continue Reading →

Create a website or blog at WordPress.com

Up ↑