Women have had many difficulties throughout history to carry out their work in the world of science and, in particular, in the world of Mathematics. With the integration of women in the workplace it seems that these differences have diminished, although the presence of women in the academic and scientific categories of responsibility seems to … Continue reading Women and Mathematics.( Phụ nữ và Toán học.)
Day: March 4, 2020
Finding Pwned Passwords in Active Directory
Weak and leaked password accounted for 73% of breaches in the last year, as reported by Verizon and Rapid7. Do you know how many of your users are using a blacklisted password? If you test user passwords, you’ll know Microsoft has never made it easy. There are always tricks to export password hashes but each … Continue reading Finding Pwned Passwords in Active Directory
Under the hood of Kubernetes and microservices
Under the hood of Kubernetes and Microservices
In this blog, we’ll start to talk about the migration journey and innovation journey before diving into different architecture types of applications, from monolith then look at the principles of microservices as well as the basics of Containers and Kubernetes through the architectural perspectives. After getting a basic understanding of all these things, we can have a closer look at a few options of using DevOps tools to help enterprises boost the productivity, in particular, using Jenkins X as their main CI/CD tools while working with Kubernetes although we got a couple of other options as well.
From monolithic to the microservices architecture
Back to the day, monolithic architecture has been popular over the last decades before the cloud became a trend. Monolithic architecture based applications tend to layer the structure into three tiers or N-tier applications, which basically like the following :
- A presentation layer also called the front-end…
View original post 2,399 more words
Upgrading Active Directory from 2012 R2 to 2019
Hi folks, this is a very quick post where I will explain the steps to upgrade Active Directory from 2012 R2 to 2019. If you are still running 2012 R2 you will be missing out on some of the features to integrate your on-prem AD into Azure Active Directory so its definitely a requirement to […]Upgrading … Continue reading Upgrading Active Directory from 2012 R2 to 2019
Interview with an ethical hacker
Phỏng vấn một hacker mũ trắng
As the old Bon Jovi song goes, “good guys don’t always wear white.” Today, we’re talking to Greg, a penetration tester who makes his living by legally hacking companies to test their security posture.
The media frequently portrays hackers as guys wearing hoodies clacking away at a BASH interface at 2am. The truth is that a large majority of hackers fall into two categories: organized crime and the professionals (AKA “penetration testers” or security researchers) who operate legally on behalf of companies. Neither wear hoodies, typically.
I recently did an interview with Greg, an ethical hacker who makes his living by hacking companies that have hired him to find flaws in their security posture. Today, he reveals how he got into this field – and how you can too!
I add in some clarification when Greg used acronyms or names that may…
View original post 4,640 more words
Best Books To Learn Ethical Hacking!
Các quyển sách hay để học Ethical Hacking