Links
Add
https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/
https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/
https://stelligent.com/2017/11/16/codepipeline-dashboard/
https://stelligent.com/2017/11/16/codepipeline-dashboard/
Simple dashboard built for viewing pipeline metrics in AWS. Built using CloudWatch dashboards and metrics populated from CloudWatch events that CodePipeline triggers. Read more...
https://aws.amazon.com/blogs/security/how-to-encrypt-and-decrypt-your-data-with-the-aws-encryption-cli/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awsencryptioncli&sc_category=AWS_Identity_and_Access_Management&linkId=44937334
https://aws.amazon.com/blogs/security/how-to-encrypt-and-decrypt-your-data-with-the-aws-encryption-cli/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awsencryptioncli&sc_category=AWS_Identity_and_Access_Management&linkId=44937334
August 31, 2021: AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info You can now encrypt and decrypt your data at the command line and in scripts—no […]
Added 1 month ago
kubectl Cheat Sheet - Kubernetes
https://kubernetes.io/docs/reference/kubectl/cheatsheet/
Added 1 month ago
18 Great Scifi Movies You May Have Missed In 2017 (But Shouldn't Have) | Gi
https://www.gizmodo.com.au/2017/12/20-great-scifi-movies-you-may-have-missed-in-2017-but-shouldnt-have/
Dive into cutting-edge tech, reviews and the latest trends with the expert team at Gizmodo. Your ultimate source for all things tech.
Massive Satori botnet emerges - Security - CRN Australia
https://www.crn.com.au/news/massive-satori-botnet-emerges-479522
netstat without netstat · Staaldraad
https://staaldraad.github.io/2017/12/20/netstat-without-netstat/
Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.
Added 1 month ago
Darktable 2.4.0 released
https://www.darktable.org/2017/12/darktable-240-released/
Added 1 month ago
Git pretty — justin hileman dot info
http://justinhileman.info/article/git-pretty/?utm_content=buffer1e7c3&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
Added 1 month ago
The Top 10 Most Downloaded AWS Security and Compliance Documents in 2017 |
https://aws.amazon.com/blogs/security/the-top-10-most-downloaded-aws-security-and-compliance-documents-in-2017/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=top10downloadeds&cdocuments2017&sc_category=AWS_Identity_and_Access_Management&linkId=46616500
July 24, 2020: The number 9 item in this list, the Auditing Security Checklist, has been replaced by a Cloud Audit Academy course. The following list includes the ten most downloaded AWS security and compliance documents in 2017. Using this list, you can learn about what other AWS customers found most interesting about security and […]
The Top 20 Most Viewed AWS IAM Documentation Pages in 2017 | AWS Security B
https://aws.amazon.com/blogs/security/the-top-20-most-viewed-aws-iam-documentation-pages-in-2017/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=top20awsiamdocpagesin2017&sc_category=AWS_Identity_and_Access_Management&linkId=46619339
The following 20 pages were the most viewed AWS Identity and Access Management (IAM) documentation pages in 2017. I have included a brief description with each link to explain what each page covers. Use this list to see what other AWS customers have been viewing and perhaps to pique your own interest in a topic you’ve […]
Analyze Database Audit Logs for Security and Compliance Using Amazon Redshi
https://aws.amazon.com/blogs/big-data/analyze-database-audit-logs-for-security-and-compliance-using-amazon-redshift-spectrum/?sc_channel=sm&sc_campaign=Big_Data_Blog&sc_publisher=TWITTER&sc_country=Global&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=redshift-spectrum-blog-db-audit-logs-03&sc_category=Amazon_Redshift&linkId=46689077
In this post, we'll demonstrate querying the Amazon Redshift audit data logged in S3 to provide answers to common use cases described preceding.
Find Training | AWS Training & Certification
https://www.aws.training/training/?sc_channel=sm&sc_campaign=Launch_Campaign&sc_publisher=TWITTER&sc_country=Global&sc_geo=EMEA&sc_outcome=adoption&trk=_TWITTER&sc_content=AWSTrainCert&linkId=46714283
Locally developing Kubernetes services (without waiting for a deploy)
https://hackernoon.com/locally-developing-kubernetes-services-without-waiting-for-a-deploy-f63995de7b99
At <a href="https://www.datawire.io" target="_blank">Datawire</a>, all of our cloud services are developed and deployed on Kubernetes. When we started developing services, we noticed that getting code changes into Kubernetes was a fairly tedious process. Typically, we had to:
Added 1 month ago
Two New Documents to Help You Navigate Australian Prudential Regulation Aut
https://aws.amazon.com/blogs/security/two-new-documents-to-help-you-navigate-australian-prudential-regulation-authority-apra-requirements/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=APRAdocuments&sc_category=AWS_Identity_and_Access_Management&linkId=46752971
How to Review Code You Don't Understand | max-bittker
https://maxbittker.github.io/code-review
Added 1 month ago
10 Australian Sci-Fi Movies You Need To Watch | Gizmodo Australia
https://www.gizmodo.com.au/2018/01/10-australian-sci-fi-movies-you-need-to-watch/
Dive into cutting-edge tech, reviews and the latest trends with the expert team at Gizmodo. Your ultimate source for all things tech.
Added 1 month ago
Firefly III - A free and open source personal finance manager
https://www.firefly-iii.org/
Firefly III
Added 1 month ago
IAM Best Practices - AWS Identity and Access Management
https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awsiambestpractices&sc_category=AWS_Identity_and_Access_Management&linkId=46957150
Follow these best practices for using AWS Identity and Access Management (IAM) to help secure your AWS account and resources.
OpenCensus: A Stats Collection and Distributed Tracing Framework | Google O
https://opensource.googleblog.com/2018/01/opencensus.html?m=1
Added 1 month ago
How to Prepare for AWS’s Move to Its Own Certificate Authority | AWS Securi
https://aws.amazon.com/blogs/security/how-to-prepare-for-aws-move-to-its-own-certificate-authority/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awscertificateauthority&sc_category=AWS_Identity_and_Access_Management&linkId=46957413
March 24, 2025: We’ve updated this post to remove an example that referenced an old CA. November 18, 2024: This post was updated to reflect the latest certificate authority information for Amazon issued public certificates. July 11, 2019: The service team has resolved an error that caused customers to see a “Certificate Transparency Required” […]
Added 1 month ago
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_common-scenarios_federated-users.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=externallyauthenticatedusersidentityfederation&sc_category=AWS_Identity_and_Access_Management&linkId=46974375
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_common-scenarios_federated-users.html?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=externallyauthenticatedusersidentityfederation&sc_category=AWS_Identity_and_Access_Management&linkId=46974375
Use roles to grant an IAM user access through identity federation (authorization by an external service).