There are three inheritance mapping strategies in hibernate:
Well, Nginx A Linux based fastest web server across the globe. Yes, you heard right. Today we will see the most important security considerations that can make your nginx server more secure and safer.
Nginx is a web server that can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache.
When you install nginx, it automatically includes many modules. Currently, you cannot choose modules at runtime. To disable certain modules, you need to recompile nginx. …
Their are various aspects when we plan to deploy our containerised application into a real production environment. so to go ahead with that we need to ensure weather the underlying environment is following a compliance to security policy. So lets start from the scratch…
What Exactly Happen When you hit container run:
it creates a set of namespaces and control groups for the container. Namespaces provide the first and most straightforward form of isolation: processes running within a container cannot see, and even less affect, processes running in another container, or in the host system. same as LXC ( now…
Hello Folks, This is friday. Today we will discuss how we can secure our rest api against various attacks. You might already know that these attacks are very harmful and you need to make your application (or API) secure, as much as you can. But how exactly…?
Their are DOS Attacks, XSS, SQL/NoSQL Injection Attacks.
You might already know that these attacks are very harmful and you need to make your application (or API) secure, as much as you can. But how exactly?
DOS Attack will crash / shut down a network, or machine, making it inaccessible. Which means users…
GOAL: in this article we will start two node Docker Swarm Cluster and go over commands to manage multiple nodes. We will put a detailed glance on topics 1) starting the Swarm 2) viewing Swarm status 3) joining the Swarm 4) obtaining join-tokens 5) Run Containers with replication 6) Response to fail-over
Considering we will do this LAB on Windows System. On this System we will Install Chocolatey + Vagrant + Install Virtualbox.
Open PowerShell as a Administrator:
Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1'))
Restart The Powershell with administrator privileges.
choco install virtualbox vagrant --yes
mkdir DockerSwarmCluster && cd…
GOAL: The aws-cli is a neat and handy command line tool from which management of AWS-services is way more faster. Therefore, this blog focuses on the usage of aws-cli. Within in this post, I’ll explain to you how to setup the aws-cli and create a Cli user for programmatic access.
1) You can develop shell scripts to manage resources
2) You have direct access to the AWS services’ public APIs.
3) You can use all of the functionality provided by the AWS Management Console. …
An ambitious Full Stack evangelist in Angular, Typescript, Spring Boot Node JS, C#, Dot Net Core WEB API, MS SQL, Redis, MongoDB, RabbitMQ, Docker and AWS.