Running containers with docker-compose

As promised in the previous post here, today we will go over running containers with docker-compose. We will use the same source code(react covid dashboard) as in the last post. So, if you want to follow along you can use the same. Below is the docker-compose.yml file from the repo. Unfortunately, I couldn’t get this […]

Working with TLS Certificates in Kubernetes (The hard way) – Part 1

As you may already know, certificates plays an important role in Kubernetes clusters. This is because the communications between various Kubernetes components are secured using TLS. For this encryption of communication and for authentication purposes, we need certificates. Here, the authentication method is 2 way authentication. So this means we need certificates for both the […]

CSRF protection in WebApps via STP

In this blogpost we will look at how we can implement Cross-Site Request Forgery protection via Synchronizer Token Patterns(STP). First things first – As you would have noticed already, this blog is primarily focused on security. Hence, to get started, I will integrate the OWASP dependency check plugin to my project. With Maven, we blindly […]

Physical security for your network/data center.

Before considering applying access control lists, firewalls and other such controls to protect your network, we must consider physical security. Because, if an adversity can easily access and tamper our devices physically, what is the point of other controls? In this post we will dive in to physical security for your network. Physical Security Categorization […]

Likatite – Facebook Application based on OAuth 2

This blog post revolves around an OAuth 2.0 based Facebook application that I have developed. This application aims at providing users of Facebook, an idea of their own profile(Few interesting things that they themselves wouldn’t know about their profile 🙂 ). In order to build this Application, I have made use of the following technologies. […]