Links
AddAs a security best practice, AWS Identity and Access Management (IAM) recommends that you use temporary security credentials from AWS Security Token Service (STS) when you access your AWS resources. Temporary credentials are short-term credentials generated dynamically and provided to the user upon request. Today, one of the most widely used mechanisms for requesting temporary […]
VS Code remote support for WSL, Containers, and SSH
Memes Generated by an Artificial Neural Network
Tracking configuration changes to your cloud resources can be challenging, especially when resources are dynamic in the cloud and change quickly and frequent...
Linux can send a notification every time a file is added to a directory. Here's how to use that for automation.
Kubernetes for Prod, Tilt for Dev
Join the Internet Storm Center's Slack channel for real-time updates on internet security events.
The latest tips, tutorials, new, and release info about Elasticsearch, Kibana, Beats, and Logstash...
It turns out that professionals are keenly interested in learning new skills (which makes us deliriously happy). And learning tends to spike in January, as people start the year focused on building new habits.
September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. December 2, 2019: Since the author wrote this post, AWS Single Sign On (AWS IAM Identity Center) has launched native features that simplify using […]
One of the most useful features of any version control system is the ability to "undo" your mistakes. In Git, "undo" can mean many slightly different things.
Keep track of where your money is going with HomeBank, the eighth in our series on open source tools that will make you more productive in 2019.
Pen-testing tool aims to protect network access points against a host of threats.
The Faucet software-defined network controller enables users to run networks the same way they run server clusters.
To keep pace with AWS innovation, many customers allow their application teams to experiment with AWS services in sandbox environments as they move toward production-ready architecture. These teams need timely access to various sets of AWS services and resources, which means they also need a mechanism to help ensure least privilege is granted. In other […]
Contribute to ayang64/doomfire development by creating an account on GitHub.