Kushan JanithRun Elastic Stack on KubernetesThis is a straightforward guide to deploying an Elastic Stack on Kubernetes. In this guide, we’ll be using the ECK operator for creating…Feb 26, 20232Feb 26, 20232
Kushan JanithPrevent Kubernetes Misconfigurations with DatreeDatree is an open source command-line solution that enables Kubernetes admins to create policies and best practices they want the team to…Aug 13, 2022Aug 13, 2022
Kushan JanithHost your web apps on EKS with Nginx Ingress and External DNSIn this guide, we’re trying to expose a web application that is hosted on EKS to the internet (or within your VPC) using Nginx Ingress and…Jul 12, 2022Jul 12, 2022
Kushan JanithDouble Submit Cookie PatternIn my last blog post, I explained what a CSRF attack is and a method (Synchronizer Token Pattern) to overcome such a problem. In this post…Oct 11, 2019Oct 11, 2019
Kushan JanithSynchronizer Token PatternCross Site Request Forgery (CSRF) is one of the biggest web attacks in the world. Others are Cross site scripting attacks, SQL injection…Oct 11, 2019Oct 11, 2019
Kushan JanithCyber Weapons: StuxnetWith the dawn of cyber warfare, nations started developing cyber weapons to deploy cyber-attacks on other nations. A cyber weapon is a…Sep 17, 2019Sep 17, 2019
Kushan JanithProtect yourself on the InternetHas your computer or mobile device ever been hacked? If yes, then you may know how difficult those kinds of situations are. You might have…Sep 17, 2019Sep 17, 2019
Kushan JanithIs the Internet safe?The internet was not originally built to be what it is today. It was a project called ARPANET which was directed by Robert Taylor and…Sep 17, 2019Sep 17, 2019