Women and Mathematics.( Phụ nữ và Toán học.)


Women have had many difficulties throughout history to carry out their work in the world of science and, in particular, in the world of Mathematics. With the integration of women in the workplace it seems that these differences have diminished, although the presence of women in the academic and scientific categories of responsibility seems to … Continue reading Women and Mathematics.( Phụ nữ và Toán học.)

Finding Pwned Passwords in Active Directory


Weak and leaked password accounted for 73% of breaches in the last year, as reported by Verizon and Rapid7. Do you know how many of your users are using a blacklisted password? If you test user passwords, you’ll know Microsoft has never made it easy. There are always tricks to export password hashes but each … Continue reading Finding Pwned Passwords in Active Directory

Under the hood of Kubernetes and microservices


Under the hood of Kubernetes and Microservices

CloudMelon Vis

In this blog, we’ll start to talk about the migration journey and innovation journey before diving into different architecture types of applications, from monolith then look at the principles of microservices as well as the basics of Containers and Kubernetes through the architectural perspectives. After getting a basic understanding of all these things, we can have a closer look at a few options of using DevOps tools to help enterprises boost the productivity, in particular, using Jenkins X as their main CI/CD tools while working with Kubernetes although we got a couple of other options as well. 

From monolithic to the microservices architecture

Back to the day, monolithic architecture has been popular over the last decades before the cloud became a trend. Monolithic architecture based applications tend to layer the structure into three tiers or N-tier applications, which basically like the following :

  • A presentation layer also called the front-end…

View original post 2,399 more words

Upgrading Active Directory from 2012 R2 to 2019


Hi folks, this is a very quick post where I will explain the steps to upgrade Active Directory from 2012 R2 to 2019. If you are still running 2012 R2 you will be missing out on some of the features to integrate your on-prem AD into Azure Active Directory so its definitely a requirement to […]Upgrading … Continue reading Upgrading Active Directory from 2012 R2 to 2019

Interview with an ethical hacker


Phỏng vấn một hacker mũ trắng

The Silicon Path

As the old Bon Jovi song goes, “good guys don’t always wear white.” Today, we’re talking to Greg, a penetration tester who makes his living by legally hacking companies to test their security posture.

Photo by vipul uthaiah on Unsplash

The media frequently portrays hackers as guys wearing hoodies clacking away at a BASH interface at 2am. The truth is that a large majority of hackers fall into two categories: organized crime and the professionals (AKA “penetration testers” or security researchers) who operate legally on behalf of companies. Neither wear hoodies, typically.

I recently did an interview with Greg, an ethical hacker who makes his living by hacking companies that have hired him to find flaws in their security posture. Today, he reveals how he got into this field – and how you can too!

I add in some clarification when Greg used acronyms or names that may…

View original post 4,640 more words

Best Books To Learn Ethical Hacking!


Các quyển sách hay để học Ethical Hacking