Running containers with docker-compose

As promised in the previous post here, today we will go over running containers with docker-compose. We will use the same source code(react covid dashboard) as in the last post. So, if you want to follow along you can use the same. Below is the docker-compose.yml file from the repo. Unfortunately, I couldn’t get this […]

Working with TLS Certificates in Kubernetes (The hard way) – Part 1

As you may already know, certificates plays an important role in Kubernetes clusters. This is because the communications between various Kubernetes components are secured using TLS. For this encryption of communication and for authentication purposes, we need certificates. Here, the authentication method is 2 way authentication. So this means we need certificates for both the […]

API Security | Oauth for RESTful APIs

In this blogpost, we will look at API Security. More specifically, we will see how we can use Oauth for RESTful APIs. For this we will be using some already available opensource software. The code for the example in this post is available at : https://github.com/ihsanizwer/API-Security-Oauth-for-RESTful-API. Basically, what I am trying to do here is […]

Physical security for your network/data center.

Before considering applying access control lists, firewalls and other such controls to protect your network, we must consider physical security. Because, if an adversity can easily access and tamper our devices physically, what is the point of other controls? In this post we will dive in to physical security for your network. Physical Security Categorization […]

Prevent grub bypass

In my previous blog post, I wrote on how to bypass grub in Linux. Therefore in this blog we will look at how to prevent grub bypass. So we know by now that sometimes this can be problematic. But sometimes when we don’t need security we can simply grub as it is. If you need […]

Bypassing grub in Linux – prob & solution

Did you just install some linux distro in your VM? or your own machine? Were you doing it by watching a tutorial on the web? Did you install grub? Have you password protected the user? Yes? Then you are secure right? The answer to that is NO! The Problem : Bypassing grub can be done […]