Posts

BlueMix UI

The Bluemix UI (which runs on Cloud Foundry) is the front-end to Bluemix, IBM’s open cloud hosting platform. The original implementation as a single-page, monolithic Java web app brought with it many demons, such as poor performance, lack of scalability, inability to push small updates, and difficulty for other teams to contribute code. Over the last 2 years, the team has been on a mission to slay these demons by embracing cloud native principles and splitting the monolith into smaller Node.js microservices. The effort to migrate to a more modern and scalable architecture has paid large dividends, but has also left behind a few battle scars from wrestling with the added complexity cloud native can bring. The team had to tackle problems in a wide variety of areas, including: large-scale deployments, continuous integration, monitoring, problem determination, high availability, and security. In the talk, I went on to discuss the advantages of microservice architectures, ways that Node...

Hack like a pro !!

Image
Step 1 Open Maltego & Register Let's start by firing up Kali and then opening Maltego. Maltego can be found in numerous places in Kali, but the easiest way to get to it is to go to Applications -> Kali Linux -> Top 10 Security Tools. Then, among the Top 10, you will find Maltego at number 5, as shown in the screenshot below. When you open Maltego, you will need to wait a brief moment for it to startup. After it finishes loading, you will be greeted by a screen asking you to register Maltego. Go ahead and register and save and remember your password as you will need it again the next time you login into Maltego. Step 2 Choose a Machine & Parameters After successfully registering and logging into Maltego, we will have to decide what type of "machine" we want to run against our target. In Maltego's parlance, a machine is simply what type of footprinting we want to do against our target. Here, we are focusing on the network footprinting, ...

Best 5 Networking Interview Questions and their Answers.

Image
Basic Common Computer IT Networking Interview Questions: In this article, we have covered the most common basic computer IT networking interview questions and answers for freshers as well as the experienced professionals. Q #1) Differentiate Communication and Transmission? Ans)  Through Transmission the data gets transferred from source to destination (Only one way). It is treated as the physical movement of data. Communication means the process of sending and receiving data between two media (data is transferred between source and destination in both ways). Q #2) Explain various types of networks based on their sizes? Ans)  Size of the Network is defined as the geographic area and the number of computers covered in it. Based on the size of the network they are classified as below, Based on the size of the Network they are classified as below, Local Area Network (LAN):  A network with a minimum of two computers to a maximum of thousands of computers ...

Use 2 way Authentication ! Practice Safe Networking !!

Image
Well here nothing related to the title but here are my 8 tips about being safe on the Internet or while being in a public network. Use two-factor authentication whenever possible. Two-factor authentication adds another layer of security when logging into a website, be it e-mail, banking, or other websites.  Some websites, such as Google, will text you a code when you login to verify your identity, while others have small devices that you can carry around to generate the code.  Authenticator apps are also available on all major smartphone platforms. Other types of two-factor authentication do exist as well, so look in the settings of your banking, shopping, and e-mail hosts for the option. Signup for login notifications This security layer is often used in place of two-factor authentication, including by websites such as Facebook.  If your account is accessed from an unfamiliar location, a notification is sent via e-mail, app, or text-message to the account ho...

5 Settings to Change on your Router

Image
Here are five basic settings to look at when configuring a Wi-Fi network router. 1. Change the network name and password To change the username and password, you'll need to log into your router's web utility in your browser. Comcast launched its web utility as soon as I connected my laptop to its Wi-Fi network, but if yours doesn't automatically launch, look for the URL for the web utility in your manual. Or you can google it by searching for "[your router name] ip address". For many routers, the address is 192.168.1.1 or 192.168.0.1. Once you're on that web utility page, you'll need to log in again, but the login information won't be the same as your Wi-Fi login. Usually, the username is "admin" and the password is "password", but you can change these credentials after logging in for the first time. If that combination doesn't work, check your router's manual. 2. Choose a security mode If you set a strong ...