Post Quantum Part 1: The storm beyond the horizon
There is a modern cryptography has a slow but looming threat just beyond the horizon, Quantum Computing. Without getting into the nitty gritty, the fundamental maths behind how we share…
CAUTH2.0: A Open Security Framework for Smart Cryptographic Wallets
Combining both an industry accepted authentication/authorization framework in conjunction with blockchain based on-chain security innovations, CAuth2.0 allows users to retain full ownership of keys whilst protecting their funds from unauthorized…
Exporting data from Elasticsearch using Python
It is a common requirement to export the data in Elasticsearch for users in a common format such as .csv. An example of this is exporting syslog data for audits.…
How to access the Docker host from a Docker container
Accessing services running on a Docker host from a hosted-container on Docker 18.03+.
Friendly Guide to deploying AWX (Upstream project to Ansible Tower)
AWX is a web-based task engine built on top of ansible. This guide will walk you through installing AWX on a fresh CentOS7 machine.
C# Time-savers for Elasticsearch
1. Context If you are currently developing using C# (Particularly .NET Core 2.0+) here are some shortcuts I hope will be able to save you time I wish I could…
Deploying a SSL Protected Containerized App: Part 3
Checklist Let’s quickly do a checklist of what we have so far SSH Accessible Virtual Machine (Running Centos 7.4) Ports 22, 443, 80 are open on the virtual machine Domain…
Deploying a SSL Protected Containerized App: Part 1
Motivation One of the greatest motivations for me is seeing the current open-source projects. It is amazing to be apart of a community that truly transcends race, age, gender, education…
N-tier Identity Provider – Why?
Cheat Sheet (For the university kids) Distributed Architecture is the “bees knees” in web technology (scalability, dependency management & service management) Stateless communication is ideal for single page applications as…