Reading time: 3 minutes
Web Application Firewall protects your web service by filtering, monitoring, and blocking any malicious HTTP/S traffic going through to the web application. WAF prevents any non-authorized data from accessing or leaving the app. Having WAF is just like having a toll booth, for example, tool booths allow only paying customers to drive on the toll road...
Reading time: 4 minutes
Managing server infrastructure introduces a vast array of operational challenges. Among other things, reducing bandwidth consumption and speeding up server upgrades can be a fundamental improvement and make the administrator’s life much easier.Ubuntu Server instances use APT package management system for software management. It allows system administrators to easily install and upgrade software across all...
Reading time: 3 minutes
Everyone seems to be jumping on the edge computing bandwagon these days, but why? This article goes into the details of what edge computing is and how we got here. It all started with the CDNs Content Delivery Networks, or CDNs for short, enable you to push all kinds of content to your end-users from...
Reading time: 1 minute
Orange Cloud and joined brands have sent employees to work from home since the beginning of March. The treat of the epidemic was clear at that time so we took appropriate measures and applied the emergency procedures to initiate remote work. We have had the procedure for remote work since the very start of our...
Reading time: 1 minute
OpenSSH project had been working on version OpenSSH 8.0p1 in 2019 when they published that “scp” protocol thus the “scp” command has a vulnerability with verification of the file name sent by server against the one that client actually requested. This issue was mitigated in OpenSSH 8.0p1 but, was never fully applied across the platforms.Reference: https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-March/037672.html An...
Reading time: 4 minutes
Should 0 bytes responses be cached or not (on middle points like CDN or other proxies) is a problem that can be addressed by two entities: RFC Client’s request For client’s request to be met it’s assumed that #1 is honored. What RFC says for 0 bytes caching, basically, is that if a file (or...
Reading time: 4 minutes
Leading meetings that produce results. We’ve all been there – you are stuck in an endless meeting, not really sure why you’re even there in the first place. And you’re probably not alone. When attending such meetings, I have the feeling of being in a hostage situation. Even worse, I can’t stop thinking about all...
Reading time: 5 minutes
Most of the time when checking logs we’re presented with a lot of data we may necessarily not need, or we have to manipulate it in some way or present it to a client in a specific way. All of that can be done using a scripting language or utilizing AWK right from the terminal...
Reading time: 6 minutes
Internal promotions can be hard to handle. If you’re promoted to be a team leader, there are some counter effects to the promotion, put upon you by your old team. Studies show that a good number of employees get fired or demoted within the first year of receiving a promotion to a higher position. People...
Reading time: 3 minutes
In one of my previous posts, I’m describing a personal take on the product management process. Based on hands-on experience, it outlines how to guide the product management process. Of course, it is only one of the ways to follow product management, but I’ve tried to generalize it in a way that would fit most...
Fill out the enquiry form and we'll get back to you as soon as possible.
Fill out the enquiry form and we'll get back to you as soon as possible.