Notes :: SCIM Hunting

In the blog post “SCIM Hunting,” the author explores the Security Assertion Markup Language (SAML) and System for Cross-domain Identity Management (SCIM) protocols, which are essential for managing user identities and access in cloud environments. For someone new to IT, understanding these protocols is crucial, as they play a significant role in ensuring secure access Read More …

Notes – AWS Firewall policies

In AWS, AWS Network Firewall policies control firewall rules, defining the monitoring and protection behavior for a firewall by using rule groups and policy default settings. Here’s a more detailed explanation: Firewall Policy: This defines the monitoring and protection behavior for a firewall, specifying how traffic is handled. Rule Groups: These are collections of rules that define the Read More …

A Beginner’s Guide to Containers and Kubernetes in IT

What Are Containers and Kubernetes? Imagine you’re moving. Instead of packing individual items loosely, you put everything for your kitchen into one box, label it, and seal it. That’s essentially what a container does for software. It packages an application and all its dependencies (like libraries and settings) into a single, isolated unit. This ensures Read More …

Notes :: Parallel Processing & Parallel Databases

At its core, parallel processing is about breaking down a large, complex task into smaller, manageable sub-tasks that can be executed simultaneously across multiple processing units or nodes. Think of it like a team project where different members tackle different parts of the assignment at the same time, leading to much quicker completion than if Read More …

Notes :: Pre-Authentication Remote Code Execution

Pre-authentication Remote Code Execution (Pre-auth RCE) is a critical security vulnerability that allows attackers to execute arbitrary code on a remote system without needing to authenticate. This means that anyone with access to the vulnerable system, often exposed online, can exploit this flaw and potentially gain unauthorized control. What is RCE? Remote Code Execution (RCE) Read More …

Notes :: Kubernetes

 Key topics include: Traditional vs. Kubernetes Challenges: Comparing the challenges of managing applications in traditional virtual machine environments versus containerized Kubernetes environments. Kubernetes Fundamentals: Defining Kubernetes, its origins, why it’s used, and key concepts like cluster architecture, API server, nodes, pods, and network policies. Kubernetes Security Fundamentals: Discussing control plane and data plane protection, including API protection, encryption, Read More …

Docker GPU Access

Docker containers can effectively allow access to the GPU, particularly through the use of the NVIDIA Container Toolkit, which enables Docker to communicate with NVIDIA GPUs.  This setup is essential for workloads such as AI/ML, deep learning, and data processing that require GPU acceleration to enhance performance.  To enable GPU acceleration, your machine needs a Read More …

Notes – About GitHub-hosted runners

GitHub offers hosted virtual machines to run workflows. The virtual machine contains an environment of tools, packages, and settings available for GitHub Actions to use. Overview of GitHub-hosted runners Runners are the machines that execute jobs in a GitHub Actions workflow. For example, a runner can clone your repository locally, install testing software, and then Read More …

AZ 900 – Part I – Microsoft Azure Cloud Concepts

Microsoft Azure Cloud Concepts Cloud Service Models Types of Cloud Computing Benefits of the Cloud Fundamental characteristics of cloud computing Cloud computing offers convenient, on-demand access to your computing resources online. This has facilitated the move to remote work and supports collaboration wherever you are located. For IT teams, cloud services also make technological provisioning Read More …