Welcome to curated list of handpicked free online resources related to IT, cloud, Big Data, programming languages, Devops. Fresh news and community maintained list of links updated daily. Like what you see? [ Join our newsletter ]

Zero days explained: How unknown vulnerabilities become gateways for attackers

Categories

Tags infosec app-development web-development devops learning

A zero day is a security flaw for which the vendor of the flawed system has yet to make a patch available to affected users. You can’t patch these holes—but you can still protect yourself. The name ultimately derives from the world of digital content piracy: if pirates were able to distribute a bootleg copy of a movie or album on the same day it went on sale legitimately (or maybe even before), it was dubbed a “zero day.”. By Josh Fruhlinger.

Borrowed into the world of cybersecurity, the name evokes a scenario where an attacker has gotten the jump on a software vendor, implementing attacks that exploit the flaw before the good guys of infosec are able to respond. Once a zero day attack technique is circulating out there in the criminal ecosystem—often sold by their discoverers for big bucks—the clock is ticking for vendors to create and distribute a patch that plugs the hole.

The content of the article:

  • Zero day vulnerability vs exploit vs attack
  • Why are zero day exploits dangerous?
  • Defense against zero day attacks
    • Practice defense in depth
    • Keep an eye out for intrusions
    • Lock down your networks
    • Be sure to back up
  • Zero day attack examples

But fighting off zero day attacks isn’t something that you need to do on your own. In fact, the broader security ecosystem—which consists of everyone from independent white-hat hacker researchers to security teams at big software and hardware vendors—has an interest in uncovering and fixing zero day vulnerabilities before malicious hackers can exploit them.

The march of zero day vulnerabilities and attacks is relentless. You wil find links to further reading in the article as well. Very good!

[Read More]

Async & await at the edge with ReactPHP

Categories

Tags open-source apis php app-development web-development

PHP 8.1 is out and the hip new feature for non-blocking and asynchronous programming in PHP are fibers. In this post we’re going to explore them and see how we at ReactPHP will start with them at the edge. By Cees-Jan Kiewiet.

Fibers are also known as green threads and offer thread like functionality within the same process, also known as cooperative multitasking. Each process always starts with the main fiber and you can decide to spawn more.

The article then deals with:

  • async
  • await
  • Run your entire application a fiber
  • Request handler
  • Looking ahead

Fibers are awesome, but because we barely scratched the surface we, ReactPHP, will start using them at the edge only. But there is a problem with that, currently there is no way to cancel a fiber as we can do now with promises ($promise->cancel()). Good read!

[Read More]

Managing Active Directory Objects with Azure AD provider for Terraform

Categories

Tags cloud infosec microservices

Learn how to manage Active Directory Objects with Azure AD Provider for Terraform and see examples of how to authenticate and grant the correct permissions. By Adam Connelly.

The Azure AD provider for Terraform can be used to manage your Azure Active Directory resources declaratively. This allows you to do things like:

  • Automatically provision users and make sure they belong to the correct groups
  • Manage Azure compute permissions via Azure AD groups

In this post, you will learn what the Azure AD Terraform provider is used for, how to authenticate and grant permissions and see examples of what you can do with it:

  • Create a Group in Azure AD
  • Authenticate with Azure
  • Grant permissions
  • Assign API permissions
  • More examples

In this post, we have covered what the Azure AD Terraform provider is used for, how to authenticate and grant the correct permissions, as well as showing a few examples of what can be done with it. Nice one!

[Read More]

How to connect R to Google Sheets using googlesheets4

Categories

Tags cloud google big-data analytics

Manipulating data in sheets can be a tedious task, but if you have at least a bit of a programmer inside you, you can make your work with Google sheets much easier. How – you ask? By connecting R to Google sheets using the googlesheets4 package provided by tidyverse. By Zuzanna.

This article will show you how to easily connect to your Google account, download data from Google spreadsheets to the dataframe in R, create a new sheet, as well as add new records, overwrite data, and delete individual columns.

  • Connect R to Google Sheets
  • Read Google sheets with R
  • Create Google sheets with R
  • Write Google sheets with R
  • Summary

Googlesheets4 is the tidyverse library that allows integrating R workspaces with Google Sheets to enable data manipulation (reading, creating, and writing) in the R environment. As the official googlesheets4 documentation states, it is a reboot of a previous package called googlesheets. Nice read!

[Read More]

Are containers always the best way to save money and provide more agility?

Categories

Tags cloud containers ibm performance

From time to time, it is good to review the solutions that make up your infrastructure. Perhaps there are efficiencies or cost savings to be made. Perhaps your needs as a company have evolved. Or perhaps a new technology or trend is challenging or supplanting existing approaches. By Naomi Scott, Callum Jackson @IBM.

Despite the current drive towards container adoption, not all companies have a mature container strategy — never mind an environment for deployment — and being the pioneer within the organization can be a daunting prospect. Containers boast a lot of advantages, including simplicity and development acceleration, but are there alternatives that provide the same or better?

The article then describes:

  • The power of simplicity
  • Saving money
  • Building resilience
  • Performance is key
  • Scalability
  • Securing your business

Containers provide a great option for modernization, but they might not be a suitable approach for those who do not have a wider containerization strategy. In this article, the common drivers for the adoption of containers have been compared with the benefits that can be delivered by the MQ Appliance. Considering the strengths of each alongside your needs and priorities is key when thinking about a container like approach. Both solutions have advantages and can be used independently or together as part of a hybrid solution.

[Read More]

API authentication with tokens

Categories

Tags programming apis learning python

In this article I’m going to show you a few common patterns for client authentication based on tokens, and how can they be implemented in a Python API back end. This method of authentication works well for rich clients, like JavaScript-based front end applications running in the browser, or perhaps a command-line (CLI) application. By Miguel Grinberg.

In terms of their composition, there are two large groups or categories of tokens that I’m going to discuss in this article. Depending on the needs of your application you will have to choose which type of token works best. To be honest, I do not know if there are formal names for these, so I’m going to name them myself. The two groups are random tokens and signed tokens.

The article is split into following sections:

  • Types of tokens
  • Random tokens
  • Signed tokens
  • How does the client get the token?
    • Copy/Paste method
    • Auth endpoint method
  • Authenticating API endpoints
  • Token revocation

An important security consideration when working with token authentication is making it easy to revoke tokens. This is not only important to control a leak, but also as a “logout” mechanism that clients can use to disable a token once they don’t need it anymore, ensuring that even if this discarded token is leaked it won’t be of use. Good read!

[Read More]

Running VMware Tanzu RabbitMQ on VMware Tanzu Kubernetes Grid

Categories

Tags cloud containers kubernetes devops distributed

Whether you’re integrating multiple microservices or building a new streaming app, you’ll need a modern messaging and streaming service. RabbitMQ is one of the most popular open-source messaging and streaming brokers. By Yimeng Liu.

Tanzu RabbitMQ is a fast and dependable messaging and streaming system that supports a wide range of use cases, including reliable integration, content-based routing, global data delivery, high-volume monitoring and data ingestion. With Tanzu RabbitMQ for Kubernetes, developers can provision both the Tanzu RabbitMQ and the open-source RabbitMQ message brokers with simple commands on top of any Kubernetes cluster. The Operator works automatically with the Kubernetes runtime to maintain the desired cluster state.

The article is about:

  • What is Tanzu RabbitMQ?
  • Why Run Tanzu RabbitMQ on Tanzu Kubernetes Grid?
  • How to Deploy Tanzu RabbitMQ on TKG?
  • Tanzu RabbitMQ capabilities
  • Tanzu RabbitMQ observability
  • Performance

In this solution, we deployed Tanzu RabbitMQ clusters on Tanzu Kubernetes Grid that provides the simplified operation of servicing cloud native workloads and can scale without compromise. Running Tanzu RabbitMQ on Tanzu Kubernetes Grid provides self-service deployment with automated operations, full observability, and fast time to recovery; thus, the solution increases your business continuity and security in any environment. Nice one!

[Read More]

Tiered datastore solution for high data growth MySQL using Distributed SQL Databases (DSQL)

Categories

Tags cloud database sql cio distributed

Usually, entities like order, order items etc tend to grow substantially year on year as we scale more and serve large customers. Generally, MySQL is the widely used datastore due to its durable & ACID guarantees. While MySQL is a brilliant tech stack, it comes with the overhead of data maintenance. By Manohar K.

Warm Store: This is a store “similar” to your transactional store. We will move all the entities which have completed their lifecycle to this store. Note that we will only keep the last X time frame data here. Also, the latency requirement is a little relaxed here as the rate of access is “relatively” less. Hint: Think MySQL like store, but horizontally scalable.

The article then takes on the journey and explains:

  • MySQL scaling
  • Phases of MySQL scaling
  • Challenges with sharded MySQL
  • Solution overview

At a high level, we need to come up with 3 different layers of data stores with the following characteristics:

  • Hot Store
  • Warm Store
  • Cold Store

Now, there are multiple DSQL databases available, we chose Pingcap’s TiDB. Along with the excellent core DSQL features and being MySQL compatible, TiDB also provides a plethora of tooling. This is something which came in very handy in our solution. Following are the tools provided by TiDB.

When it comes to data management and especially when it is a technology like MySQL, the archival policies usually people follow is a one time big bang activity of data purge and movement. Good read!

[Read More]

How to build a powerful e-learning platform using Scala and Redis

Categories

Tags cloud miscellaneous scala java machine-learning big-data nosql

Never before has online learning been so accessible. Whether you want to discover more about cryptocurrency, sharpen your programming skills or even just learn a new language, the digital age has gifted everyone access to a phenomenal amount of content. However, over time e-learning has been viewed as just another digital commodity, where users expect all online content to be instantaneous. Speed remains crucial to performance, where any lags or delays in page loading time kills the user’s experience. By Redis Growth Team.

Architecture model for e-learning platform

Source: https://redis.com/blog/how-to-build-a-powerful-e-learning-platform-using-scala-and-redis/

In this tutorial you’ll build a powerful e-learning platform that will connect students and teachers with one another along with a diverse library of online courses. With speed being the linchpin to performance, you’ll deploy a number of different Redis components to achieve this objective.

The data model is expressed through nodes and relations using RedisGraph. The model is very simple since it involves the Student, Course and Topic entities expressing the different kinds of relations between each other. Being this far into the digital age, a simple prerequisite of any application is for it to operate at maximum speed. This is especially true for e-learning platforms where users are meant to be engaged with its course content for long periods of time. Good read!

[Read More]

Learn more about distributed databases with ShardingSphere

Categories

Tags database distributed nosql cio

Apache ShardingSphere is an open source distributed database, plus an ecosystem users and developers need for their database to provide a customized and cloud-native experience. By Trista Pan.

Database Plus sets out to build a standard layer and an ecosystem layer above the fragmented database’s basic services. A unified and standardized database usage specification provides for upper-level applications, and the challenges faced by businesses due to underlying databases fragmentation get minimized as much as possible. To link databases and applications, it uses traffic and data rendering and parsing. It provides users with enhanced core features, such as a distributed database, data security, database gateway, and stress testing.

Apache ShardingSphere is an open source distributed database, plus an ecosystem users and developers need for their database to provide a customized and cloud-native experience. In the three years since it joined the Apache Foundation, the ShardingSphere core team has worked hard with the community to create an open source, robust, and distributed database and a supporting ecosystem.

The content of the article is split into:

  • Database Plus
  • Standardized cluster management with DistSQL
  • Multi-access terminal
  • Distributed governance
  • Monitoring with Grafana

The community is continuing to optimize ShardingSphere and to integrate new ideas and industry scenarios. The community built it, and one of the main driving forces of development is user feedback. Good read!

[Read More]