In my last couple of blogs, I talked about Docker monitoring, why I would need Docker monitoring and how I can monitor Docker containers using AWS, Ruxit and Sysdig. Today, we are going to talk about another such tool which most of us already know about which also provides Docker monitoring. The tool is New […]
Will your next laptop be a smartphone? The idea isn’t as crazy as it sounds. In the coming decade, mobile phones will gain capabilities that make them suitable replacements for the conventional desktop/laptop computer. Phones are already more popular than PCs. New research shows that smartphone shipments topped those of client PCs — including desktops, laptops, netbooks, and […]
Recently, I worked on a task wherein the users had to be authenticated based on existing Google credentials to get access of AWS Management Console. It took more time than expected to make it work as the documentation provided by Google is not complete. Let’s start by setting this up step by step. Scenario: Provide […]
Application SecurityTechnology
Many applications provide an option to download some data as a CSV file. More often than not, this downloaded data is user controlled data. For instance, take the scenario where an administrator can export the data of all the users as a CSV file. The fields in the file include the details filled by the […]
Building compressed files of Springboot application is a tedious task and its continuous deployment using Jenkins is even more so. To simplify the above predicament, a new Gradle plugin in Jenkins has been used. So, our objective in this blog is to make use of the relation between Gradle and Springboot. Let us take it […]
Capistrano is a tool to perform tasks on multiple servers over SSH. We can use Capistrano to deploy code on multiple servers running under auto-scaling. Below is one of the use cases which I solved with the help of Capistrano and bash scripts. I’ve used Capistrano for code deployment and its management using bash shell […]
Application SecurityAWSTechnology
I was recently searching for something on Google and came across this instance of what might be a logical vulnerability prevailing across multiple web applications. I was searching for publicly accessible Jenkins console through Google Dorking. My search query listed some of the websites that had Jenkins as a part of their domain name. Although this itself […]
This is an era of web video revolution. If videos are becoming the King of Content, then YouTube is the King of video platforms. But, the trend proclaiming YouTube as the undisputed champion of video content marketing has started waning. This is mainly due to the mushrooming of numerous VOD platforms and live streaming applications. […]
Social media is no longer in its inception stage as we have come forward a good number of years after its disrupting dawn. Since then, the phenomenon called as social media has gone through a lot of changes. Throughout its course of evolution, it has brought radical changes to the way consumers think, behave and […]