Welcome to curated list of handpicked free online resources related to IT, cloud, Big Data, programming languages, Devops. Fresh news and community maintained list of links updated daily. Like what you see? [ Join our newsletter ]

How to enable HSTS for enhanced web security in Apache

Categories

Tags app-development infosec web-development apache ssl

HTTP Strict Transport Security (HSTS) is a web security policy mechanism that helps to protect websites against protocol downgrade attacks and cookie hijacking. It allows web servers to declare that web browsers (or other complying user agents) should interact with it using only secure HTTPS connections, and never via the insecure HTTP protocol. This article will guide you on how to implement and optimize HSTS in Apache for improved web security. By Rahul.

The article then describes:

  • Why use HSTS?
  • Implementing HSTS in Apache
  • Optimizing HSTS in Apache
  • Potential pitfalls and how to avoid them
  • Monitoring and maintaining HSTS

Implementing and optimizing HTTP Strict Transport Security (HSTS) on your Apache server is a crucial step towards securing your website and safeguarding user data. By enforcing HTTPS connections, preventing protocol downgrade attacks, and thwarting cookie hijacking attempts, HSTS provides a robust mechanism for enhancing web security. Interesting read!

[Read More]

From 'Likes' to 'Rewards': How web3 is disrupting traditional social media model

Categories

Tags web-development infosec blockchain management miscellaneous cio

Over the past decade, social media platforms have revolutionized social interactions for people looking to connect with friends, family, and like-minded individuals and communities. Since the dawn of MySpace and Facebook, social media has provided us with an unprecedented level of connectivity and has opened up a world of opportunities for businesses to connect with their customers. However, with the rise of Web3, traditional social media platforms are being forced to rethink their models in order to stay relevant in a rapidly evolving digital landscape. By chain.com.

One of the greatest advantages of Web3 is the ability to reward users for their contributions to online communities. Instead of relying on traditional advertising models to generate revenue, Web3 platforms use cryptocurrencies and tokens to incentivize user participation. This means that users can be rewarded for creating content, engaging with others, and contributing to the growth of the community.

The rise of Web3 has led to the emergence of a new generation of social media platforms that are built on blockchain technology. These platforms offer a range of new features and benefits that are not available on traditional social media platforms. They allow users to take ownership of their online identities and data, and provide them with greater control over their online presence. Some examples include:

  • Brave Browser: The Brave Browser is an example of an open-source web browser that incentivizes users with Basic Attention Tokens (BAT) for watching ads
  • Decentraland: Decentraland is a platform on the Ethereum network where users can purchase land parcels and build their own virtual reality experiences
  • ySign: The decentralized app called ySign offers users a way to communicate securely online through real-time chats that use end-to-end encryption algorithms to safeguard their privacy
  • Mirror: Mirror is a platform for publishing on Web3 that prioritizes user privacy and decentralization

In these decentralized models, there is no central authority that controls the platform. Instead, these social platforms are powered by a network of nodes that work together to verify transactions and maintain the platform. This proposes several implications for social media. Interesting read!

[Read More]

Dissecting Npm malware: Five packages and their evil install scripts

Categories

Tags app-development infosec web-development nodejs javascript

Packages published on npm can declare pre and post-install hooks, which are scripts that run, well, pre or post-install. That is to say, when the npm CLI installs a package, it also runs those scripts on your machine. By Gabi Dobocan.

It runs them silently, in the background. Sounds like a bad idea? It kinda is.

In practice, these scripts can be very useful for automating tasks that need to be done every time a package is installed or updated. They can help ensure that the package is installed correctly and that any necessary setup or configuration tasks are completed automatically.

The article then delves into:

  • How can install scripts hurt you
  • Packages can silently leak your private data
  • Packages can remotely run scripts for full access to your machine and data
  • Any npm install comes with a risk

While researching this article, it was easy to identify many packages that have declared malicious install scripts directly in their package.json manifest. However, that is a naive approach, and most malware does a much better job of hiding and obfuscating sensitive code. Around 700k package versions in the npm registry currently declare install scripts, and could thus execute code that compromises the security of your dev machine, or your CI build. More are added every day. Very interesting!

[Read More]

Redis performance tuning: How to optimize Redis for high-traffic applications

Categories

Tags app-development web-development performance code-refactoring

Redis is a widely-used in-memory data store that is known for its speed and flexibility, making it ideal for building high-performance applications. However, with its increasing popularity and the explosion of high-traffic applications, it becomes crucial to optimize Redis to keep up with the growing data demand. By Jatin Sharma.

Read on to learn how to optimize your Redis database for lightning-fast speed and excellent scalability. You will learn:

  • How Redis Works?
  • How to optimize your Redis application?
    • Use Redis data types wisely
    • Use pipelining
    • Use Redis cluster
    • Use a connection pool
    • Use Redis Sentinel
    • Use Redis TTL to expire keys
  • Why you should perform these optimizations?
  • Why do developers fall under the non-optimized path?

Redis is a highly performant and scalable in-memory database that can be a great choice for high-traffic applications. However, to achieve maximum performance, it’s important to properly tune Redis and optimize it for your use case.

[Read More]

How to add a Software Bill of Materials (SBOM) to your containers with GitHub Actions

Categories

Tags cicd containers docker infosec

Learn how to add a Software Bill of Materials (SBOM) to your containers with GitHub Actions in a few easy steps. An SBOM is an inventory of the components that make up a software application. It is a list of the components that make up a software application including the version of each component. The version is important because it can be cross-reference with a vulnerability database to determine if the component has any known vulnerabilities. By Alex Ellis.

In this article you will learn:

  • What is a Software Bill of Materials (SBOM)?
  • Check out an SBOM for yourself
  • Checking for vulnerabilities
  • Generate an SBOM from within GitHub Actions

In this article author looked at Anchore’s two open source tools: Syft and Grype, and how they can be used to generate an SBOM and scan for vulnerabilities. With the SBOM approach, the responsibility is rebalanced, with the supplier taking on an active role in security. The consumer can then use the supplier’s SBOMs, or run their own scanning infrastructure - or perhaps both. Nice one!

[Read More]

12 best & most unique search engines to try in 2023

Categories

Tags data-science search miscellaneous bots cio browsers

Although Google is by far the most popular search engine, it’s certainly not the only search engine. Different search engines have different audience demographics. And different pros and cons. By Vlado Pavlik.

In this article, author will explore those differences. Read on for a comprehensive list of these search engines and their most unique features:

  • Google
  • Bing
  • DuckDuckGo
  • Yahoo
  • Baidu
  • Yandex
  • Brave Search
  • Neeva
  • You
  • Startpage
  • Ecosia
  • Swisscows

Some of these engines focus on privacy. For example Brave is a privacy-focused web browser founded in 2015. It also has its own search engine—called Brave Search—that you can use within or outside the Brave browser. Brave Search offers a private and anonymous search. Unlike some other smaller search engines, Brave uses its own web index and algorithms. But you can also enable “Google fallback.” This means Brave will also check Google to provide more accurate results.

Ecosia however is a search engine that donates a portion of its ad revenue to tree-planting initiatives around the world. You will also find further interesting information (e.g. Top 5 most popular search engines, best privacy oriented, ones with own crawler etc.) and categorisaton on search engines in this article. Very interesting read!

[Read More]

A serverless query engine from spare parts

Categories

Tags data-science streaming apis database serverless open-source

An open-source implementation of a Data Lake with DuckDB and AWS Lambdas. In this post we will show how to build a simple end-to-end application in the cloud on a serverless infrastructure. The purpose is simple: we want to show that we can develop directly against the cloud while minimizing the cognitive overhead of designing and building infrastructure. By Ciro Greco.

DuckDB is an open-source in-process SQL OLAP database built specifically for analytical queries. It is somewhat still unclear how much DuckDB is actually used in production, but for us today the killer feature is the possibility of querying parquet files directly in S3 with SQL syntax. As data practitioners we want (and love) to build applications on top of our data as seamlessly as possible. Whether you work in BI, Data Science or ML all that matters is the final application and how fast you can see it working end-to-end. The infrastructure often gets in the way though.

This tutorial then describes:

  • Architecture
  • Your first query engine + data lake from spare parts
  • (Almost) free analytics
  • A few remarks on the “Reasonable Scale”

In this post, we showed that the combination of data-first storage formats, on-demand compute and in-memory OLAP processing opens up for new possibilities at Reasonable Scale. Repository with the relevant code and architecture explanation are also provided. Interesting read!

[Read More]

Introducing storage on Vercel

Categories

Tags app-development web-development apis database serverless nosql

Vercel KV, Vercel Postgres, Vercel Blob, and Vercel Edge Config are now available. Driven by the need for both performance and personalization, frameworks are becoming server-first and edge-first. By vercel.com.

This shift is exemplified by React Server Components and the introduction of streaming infrastructure into Vercel runtimes. These capabilities make it easier than ever to fetch data from a database or other data sources, within the server component itself.

Verel is excited to announce a suite of serverless storage solutions now available on Vercel, powered by some of the best infrastructure providers in the industry:

  • Vercel KV: A serverless Redis solution that’s easy and durable, powered by Upstash
  • Vercel Postgres: A serverless SQL database built for the frontend, powered by Neon
  • Vercel Blob: A solution to upload and serve files at the edge, powered by Cloudflare R2

A key-value store like Redis is one of the most common tools developers reach for when managing things like rate-limiting, session management, or application state. Vercel’s first-party storage makes it easy for developers to manage their frontend storage needs, without worrying about infrastructure. Excellent news!

[Read More]

The REST API Handbook – How to build, test, consume, and document REST APIs

Categories

Tags app-development restful apis cloud devops web-development react

This tutorial aims to show you an example of how you can fully implement a REST API. We’ll cover basic setup and architecture with Node and Express, unit testing with Supertest, seeing how we can consume the API from a React front-end app and finally documenting the API using tools such as Swagger. By Germán Cocca.

Keep in mind we won’t go too deep into how each technology works. The goal here is to give you a general overview of how a REST API works, how its pieces interact, and what a full implementation might consist of. In the article you will find information on:

  • What is REST?
  • How to Build a REST API with Node and Express
  • How to Test a REST API with Supertest
  • How to Consume a REST API on a Front-end React App
  • How to Document a REST API with Swagger

RESTful APIs are designed to be simple, scalable, and flexible. They are often used in web and mobile applications, as well as in Internet of Things (IoT) and microservices architectures. Good read!

[Read More]

Distributed cloud-native graph database with NebulaGraph Docker extension

Categories

Tags app-development docker cio containers devops database

Graph databases have become a popular solution for storing and querying complex relationships between data. As the amount of graph data grows and the need for high concurrency increases, a distributed graph database is essential to handle the scale. Finding a distributed graph database that automatically shards the data, while allowing businesses to scale from small to trillion-edge-level without changing the underlying storage, architecture of the service, or application code, however, can be a challenge. By Wey Gu and Ajeet Singh Raina.

In this article, we’ll look at NebulaGraph, a modern, open source database to help organizations meet these challenges. Further ion the article:

  • Meet NebulaGraph
  • Architecture of the NebulaGraph database
  • Why NebulaGraph?
  • Why run NebulaGraph as a Docker Extension?
  • Getting started with NebulaGraph in Docker Desktop

NebulaGraph is ideal for graph database needs because of its architecture and design, which allow for high performance, scalability, and cost-effectiveness. The architecture follows a separation of storage and computing architecture, which provides many benefits, inlcuding automatic sharding, high performance, high availability, flexibility, support for APIs. Nice one!

[Read More]