Links
AddAn easy-to-use secure configuration generator for web, database, and mail software. Simply select the software you are using and receive a configuration file that is both safe and compatible.
Safely shareable TLS root CA for .internal networks using Name Constraints - nh2/internal-contstrained-pki
Four related algorithms are now ready for use to protect data created and transmitted by the Internet of Things and other electronics
Follow these best practices for using AWS Identity and Access Management (IAM) to help secure your AWS account and resources.
Share This Editorial
A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business functions. Includes automated scoring, contextual recommendations, and evidence-based evaluation. - devsecflow/Cloud-Native-Assurance-Maturity-Model
use pre-push hooks instead
data engineering book. Contribute to datascale-ai/data_engineering_book development by creating an account on GitHub.
Diagram as Code Tool Written in Rust with Draggable Editing - RohanAdwankar/oxdraw
Here at Labyrinth Labs, we put great emphasis on monitoring. Having a working monitoring setup is a critical part of the work we do for our clients. Cloudflare's Analytics dashboard provides a lot of useful information for debugging and analytics purposes for our customer Pixel Federation. However, it doesn’t automatically integrate with existing monitoring tools such as Grafana and Prometheus, which our DevOps engineers use every day to monitor our infrastructure.
The Internet Archive has suffered a data breach affecting 31 million accounts and is now offline after its site was defaced and DDoS’d.
When they say "everywhere", do they mean worldwide?
When I was a kid, my sister and I had a tower of VHS tapes we watched endlessly. Fast-forward to today, and my children's movie collection is vastly different. It's completely digital and dispersed across services. I wanted to recreate the tangibl...
Personal blogs are back, should niche blogs be next? Might good old fashion niche blogs be the solution to rampant social media misinformation, AI slop, and more?
POSSE is an abbreviation for Publish (on your) Own Site, Syndicate Elsewhere, the practice of posting content on your own site first, then publishing copies or sharing links to third parties (like social media silos) with original post links to provide viewers a path to directly interacting with your content.
Lenticular Clock: After making my Moire Clock a got interested in a very similar effect: lenticular animations. You probably have seen this effect before, e.g. on post cards. I remember having a ruler in primary school with a picture of dinosaurs on it that changed d…
The long-awaited law, if passed, will be Australia’s first standalone cyber security act.
There's a new contender for your holiday fireplace video.
Free open source enterprise distributed VPN server. Virtualize your private networks across datacenters and provide simple remote access in minutes.
A collection of Free Public APIs for Students and Developers. Tested every single day.