ContentPosts from @mudit009..
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Fingerprinting pfSense using GitHub analysis

Penetration testers use GitHub repositories to find vulnerabilities in open source applications. They analyzed the pfSense repository to determine the version of the target application. They wrote scripts to retrieve directory contents and compare files across different versions, saving the results .. read more  

Fingerprinting pfSense using GitHub analysis
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

How to Perform a Network Security Risk Assessment

Ensuring network security: The importance of conducting a comprehensive network security risk assessment to safeguard against cyberattacks, address vulnerabilities, and build trust with stakeholders and customers... read more  

How to Perform a Network Security Risk Assessment
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

What to Look for When Selecting a Static Application Security Testing (SAST) Solution

Discover how to choose the right vulnerability scanning product for your business and get started with vulnerability scanning... read more  

What to Look for When Selecting a Static Application Security Testing (SAST) Solution
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

What is SaaS Security? - Types, Challenges, Threats & Protection Guide

SaaS security protects data and applications in cloud environments. It includes data protection, access controls, infrastructure security, application security, incident response, and compliance. Organizations should choose reputable providers, implement encryption and strong authentication, monito.. read more  

What is SaaS Security? - Types, Challenges, Threats & Protection Guide
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Integrating DAST Into Your CI/CD Pipeline: Benefits and Implementation

Integrating Dynamic Application Security Testing (DAST) into your CI/CD pipeline helps detect web application vulnerabilities early, improves security, speeds up time-to-market, and reduces costs. Choose the right DAST tool, start early in the development process, schedule regular scans, prioritize .. read more  

Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Exploring Firecracker MicroVMs for Multi-Tenant Dagger CI/CD Pipelines

The author experimented with running isolated CI/CD pipelines using Firecracker microVMs for improved security. They set up the infrastructure, compiled a custom kernel, built a rootfs, enabled internet access, launched the microVM, and ran a sample pipeline using the Dagger engine... read more  

Exploring Firecracker MicroVMs for Multi-Tenant Dagger CI/CD Pipelines
Story
@xakrume shared a post, 2 years, 6 months ago
engineer

BASH Challenges in Customizing the Command Prompt in Linux and Their Solutions.

Transforming the Command Prompt: A Journey of Terminal Colors or How to Avoid Getting Trapped

misconfigured bash prompt
Link
@akshaybaluapuri shared a link, 2 years, 6 months ago
DevOps Engineer, Coditas

Hello all, in this blog I’ll try to showcase the beatuiness of AWS system manager. As AWS System Manager is effective and consist of many operations we may divide this blog into some parts.

Hello all, in this blog I’ll try to showcase the beatuiness of AWS system manager. As AWS System Manager is effective and consist of many operations we may divide this blog into some parts.
Link
@prathamesh-sonpatki shared a link, 2 years, 6 months ago
SRE, Last9.io

o11y.wiki - A glossary of all terms related to Observability, starting from A to Z!

The inspiration for this project started from the desire to understand and document terms and concepts related to Observability in one single place... read more  

Story
@daryna_dmytriievska shared a post, 2 years, 6 months ago
MArketing Specialist, Railsware

How to Send Emails with Telnet on Windows and Linux

Simple steps will help you to launch send email using Telnet option

Send-emails-with-Telnet-featured-image-700x363.png