security
-
Splunk Enterprise Cost
Splunk Enterprise is a leading platform for operational intelligence, providing real-time insights into your data. But how much does it cost? In this blog post, we’ll explore the various pricing models offered by Splunk Enterprise. Splunk Enterprise offers a variety of pricing models to align with your business needs and data usage. 1. Workload Pricing… Continue reading
-
Threat Modeling – Trust Boundaries and DFD (Data Flow Diagrams)
Threat modeling is a structured approach that aims to identify and prioritize potential threats and vulnerabilities in software applications and systems1. The steps involved are: The goal of threat modeling is to document security threats to an application and make rational decisions about how to address them. It helps detect problems early, spot design flaws, evaluate new forms… Continue reading
-
Security Certifications
Industry-specific certifications like ISO 27001, PCI (Payment Card Industry Data Security Standard), and SOX (Sarbanes-Oxley Act) are designed to ensure compliance with various security and privacy requirements across different sectors. Here’s a brief overview of these certifications and the industries they are applicable to: What is PCI DSS? PCI DSS: This is a set of… Continue reading
-
Approach to Design: Desktop-First
A desktop-first approach to design and development is more appropriate in scenarios where the primary users are expected to access the application through desktop computers. This might be the case for software that requires a large screen for complex data visualization, such as enterprise resource planning (ERP) systems, or for applications that need the higher… Continue reading
-
Spatio-Temporal Video Analytics
Spatio-temporal video analytics is a field of software engineering that involves understanding and processing video data in both spatial (frame-by-frame) and temporal (over time) dimensions. It’s usages are plenty – It can be used in action recognition, object detection, and video frame interpolation. Reference https://arxiv.org/abs/2110.01015 Authors Rishubh Parihar, Gaurav Ramola, Ranajit Saha, Ravi Kini, Aniket Rege, Sudha Velusamy Code, Data… Continue reading
-
Multiple Entries into the /etc/hosts file
The general format of the /etc/hosts file: You can list multiple hostnames for a single IP address, separated by spaces. However, having too many entries on a single line can sometimes make the file difficult to read. If readability becomes an issue, you can use multiple lines with the same IP address: Save the file. Flush your… Continue reading
-
HTTP Redirection Rules – 302 vs 301
We recently ran into a situation when the debate on whether to use 301 Redirect (Permanent) vs 302 Redirect (Temporary) became a bit intense. I was in favor of a 301 as I had to redirect to a new page until December mid and I was in April 1st week. My colleagues contested and raised… Continue reading
-
Pre-commit Hook: For preventing Passwords from being committed
We have to check for patterns that might indicate a password or other sensitive information inside a git pre-commit hook inside the .git/hooks directory in a repo & create a plain text file named pre-commit without any file extensions. The pre-commit file is a bash instructions file and therefore, we have to make it executable by running the command: chmod +x… Continue reading
-
Blob URLs for extra security
Blob URLs for Videos in Stories and other multimedia content is a fantastic choice because of the following reasons: The use of blob URLs provides a secure, dynamic, and optimized multimedia experience for its users while protecting the intellectual property of content creators. Let’s take a look at the following Node.js code that demonstrates how… Continue reading
-
Details from WHOIS IP look up
This WHOIS lookup result provides details about an IP range owned by Flipkart Internet Pvt Ltd in India. One day, while surfing, I decided to take a peek at one of the remote addresses 163.53.76.86 and when I looked up the IP address, the WHOIS lookup result provided me following information about the IP address… Continue reading