At least once in your life, you've been cyberpwned. Also, chances are that you know exactly what triggered the successful attack. Continue reading
How to Check Your VPN for Data Leaks
Just a few short years ago, virtual private networks (VPNs) were a novel technology to the masses. The advanced security and anonymity they offered were only for paranoids and dissidents. Fast forward to today’s internet with its daily headlines of massive data breaches, government snooping, and a Dark Web with an endless appetite for your personal information. Continue reading
How to Resize a Partition on macOS
If you are performing data recovery on the changed hardware setup you often need to resize partitions of your drive. In this article, we will overview this process for Macs.
How to Resize Partition on Windows OS
In this article, we are going to show how to resize HDD/SSD drive partitions keeping user and system data. Partition resizing is a common task if your hard drive needs to be replaced in any case (except failure) or you would like to reorganize stored data in a new way. Continue reading
How You Can Use AWS Free Tier — Databases
This article covers the Amazon Relational Database Service (RDS), Amazon DynamoDB, and AWS Data Migration Service. For each tool, we will cover what it is, how it’s billed and the available free tier, and some example projects you can try.
How You Can Use AWS Free Tier — Cloud Compute
Cloud computing has triggered a sea change in how application development is done. Amazon Web Services, or AWS, is the leader in the cloud computing space and provides computing infrastructure for many of the largest companies in the world. Continue reading
Cryptojacking: How to Detect and Avoid
Modern hackers now look to take advantage of the mining boom by building malware that can hijack one or more systems and remotely use the hardware for financial gain. Such attacks are known as cryptojacking and continue to affect more and more internet users. Continue reading
How to Resize an Amazon Elastic Block Store Volume
Reaching a capacity limit in Amazon Elastic Block Storage (EBS)? Need more IOPS for an app or web-service? Due to its design, Amazon EBS doesn’t allow to scale the volume size dynamically or extend volume IOPS. If a user needs more space, he has to buy another Amazon EBS volume and then spend hours to backup data from the original volume, verify its consistency and then restore on the new one.
This article is a step-by-step guide on how to use AWS built-in features to easily resize the Amazon EBS volume.
Continue reading
Amazon S3 Security Part 3: IAM Identities
This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading
AWS Security Part 2: Basics of IAM Policies
This is the second in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we will take a deeper look at managing access to your S3 resources using AWS Identity and Access Management (IAM). Continue reading
Office 365 Hybrid Migration
Many organizations decide to skip the expense of maintaining an on-premises Exchange server and migrate to Office 365, which offloads the server to the Microsoft cloud (see all the reasons why it's time to perform Exchange to Office 365 migration). Once that decision has been made, the next step is to decide on the type of migration. In this article, we will overview the main types of Exchange cloud migration. Continue reading
AWS Security Part 1: ACLs vs Bucket Policies vs IAM
To use Amazon S3 effectively, you need to be aware of the security mechanisms provided by AWS to control your S3 resources. This is the first part in a three-part series on S3 security. In this part, we will discuss the three different access control tools provided by AWS to manage your S3 resources. Continue reading