Rohit Shrivastava#39 Shorticles: DDoS and SQL InjectionDDoS (Distributed Denial of Service) and SQL Injection are two different types of cybersecurity threats, each targeting different aspects…2h ago2h ago
Rohit Shrivastava#38 Shorticles: Application Configuration Security in AWSIn AWS, application configuration typically includes the following elements:2h ago2h ago
Rohit Shrivastava#37 Shorticles: Fine-Grained ControlFine-grained control refers to the ability to specify detailed and precise permissions or rules regarding what actions a user, service, or…3h ago3h ago
Rohit ShrivastavaEnsuring Compliance with S3 Bucket Versioning Using AWS Lambda and AWS ConfigIn today’s digital landscape, data management and compliance are paramount for businesses of all sizes. One essential aspect of data…1d ago1d ago
Rohit ShrivastavaCan we restrict AWS User to access AWS IAM policies?At CloudX Innovations, a developer named Alex was working on a project that required access to EC2 instances and S3 buckets. However, Alex…Sep 16Sep 16
Rohit Shrivastava#36. Shorticles: Curl Command with Different FlagsThe curl command is a powerful tool used for transferring data from or to a server using various protocols (HTTP, HTTPS, FTP, etc.). Here…Jun 10Jun 10
Rohit Shrivastava#35. Shorticles: Docker Commands At-GlanceBelow is a list of commonly used Docker commands along with a brief explanation of each:May 1May 1
Rohit Shrivastava#34. Shorticles: How to access cross-account S3 using AWS Glue.Recently I came across one use case where user wants AWS Glue from one account crawls data from S3 in another account. So, it’s going to be…Aug 29, 2023Aug 29, 2023
Rohit Shrivastava#33. Shorticle: AWS EC2 — The Foundation of Elastic Cloud ComputingIntroduction: Amazon Elastic Compute Cloud (EC2) is a fundamental and widely-used service offered by Amazon Web Services (AWS). As a web…Jul 31, 2023Jul 31, 2023