Intrusion Detection Systems: Behind the Firewall

Reading Time: 4 minutes

What is an Intrusion Detection System? 

An intrusion detection system (or IDS) is a hardware device or software program that observers a network or system for security policy violations or malicious activity. Typically, any activity or intrusion violation is reported to either an administrator or is collected and logged in a central location using a security information and event management system (or SIEM) system. This system is a security-based technology developed initially for detecting exploits and vulnerabilities used against a computer or other target applications.

IDS systems are usually a passive system that monitors and reports issues that need to be investigated. This product differs from an Intrusion Prevention System (or IPS) in the sense that an IPS assumes an active role by monitoring and defending the system against threats. If a prospective danger is seen, the IPS quickly takes action to prevent any detected exploits from occupying and seizing the system. 

Continue reading “Intrusion Detection Systems: Behind the Firewall”

How to Use Linux Pipe for Redirection

Reading Time: 4 minutes

A pipe is a form of redirection in Linux used to connect the STDOUT of one command into the STDIN of a second command. It allows us to narrow the output of a string of commands until we have an easily digestible amount of data. The pipe character is the | symbol and is placed between any two commands. Pipes are one of the most used command-line features that Linux has. Every article showing Linux commands will almost inevitably include pipes. 

Continue reading “How to Use Linux Pipe for Redirection”

How to Store Secrets in Kubernetes

Reading Time: 5 minutes

What is a Secret? 

k8s secrets

A Kubernetes Secret is an object that enables us to store and manage sensitive information. A Secret can contain data like SSH keys, OAuth data, or other user authentication information like passwords. It is typically stored within a cluster in a manner native to Kubernetes. Using a Secret object provides more granular control over how highly sensitive data is used. It also lowers the risk of data exposure to unauthorized parties. 

Continue reading “How to Store Secrets in Kubernetes”

How To Use the Find Command In Linux

Reading Time: 6 minutes
Find Logo

One of the most popular command-line utilities is the find command, mainly because of its simplicity and versatility. It’s the default option to search for files across multiple UNIX based systems with a wide range of parameters and variables to narrow down our searches. It helps look for files matching a specific name, date, size, or even owner to provide a frame to append other commands to the list of files found. The basic structure of the find command is as follows. 

find [parameters] [path] [search patterns] 
Continue reading “How To Use the Find Command In Linux”

What is Blockchain? A Tutorial

Reading Time: 9 minutes
what is blockchain

The idea of blockchain itself may sound complicated, but the premise is simple. Blockchain is a zero-trust, fully decentralized peer-to-peer data storage system that spreads verified information across participants in the chain, referred to as nodes. Blockchain stores this information in blocks that are chained together. As new data arrives, it is recorded into a block. Once a block has been filled with information, it is linked to the previous block. This process allows the data to be bound together in sequential and chronological order. 

Continue reading “What is Blockchain? A Tutorial”

How to Install and Configure KubeKey

Reading Time: 5 minutes

What is KubeKey?

kubekey2

KubeKey is the newest Kubernetes installer for KubeSphere. KubeSphere is a distributed OS management system for cloud-native applications using Kubernetes as its kernel. It provides a plug-and-play structure for seamless integration of many third-party applications. It is somewhat similar in nature to MiniKube for installing Kubernetes.

KubeKey was developed using the Go programming language. It provides a quick method to install Kubernetes and any additional add-ons using Chart or YAML files. KubeKey uses the kubeadm application to install a Kubernetes cluster on multiple nodes in a synchronous manner to reduce the complexity of the installation and improve efficiency. Using KubeKey reduces installation time considerably compared to many other installation techniques.

Continue reading “How to Install and Configure KubeKey”