Author Archive

Deploying an Application using AWS CodeDeploy and CodePipeline

Posted by:

AWS CodeDeploy is part of a family of AWS deployment services that includes AWS Elastic Beanstalk, AWS CodePipeline, AWS CloudFormation, and AWS OpsWorks. AWS CodeDeploy coordinates application deployments to Amazon EC2 instances. It deploys applications from Amazon S3 buckets and GitHub repositories where the application contains deployable content like code, web, configuration files, executable packages, and so on.
First, you create an application on AWS Code Deploy that communicates with your EC2 instance along with the ARN Role of your …

Continue Reading →
0

Deploying a Website with the AWS Certificate Manager

Posted by:

The AWS Certificate Manager (ACM) simplifies and automates most tasks traditionally associated with the management of SSL/TLS certificates. He/she helps in the provisioning, deploying and managing of certificates for AWS-based websites and applications.
24/7 Network Engineers used the ACM to generate a certificate, while deploying the load balancer for a client. Using the ACM they successfully saved their clients’ time and money in getting the whole process approved by Certificate Authorities.
The ACM generates a Key pair of certificate signing …

Continue Reading →
0

Automating Deployments

Posted by:

Developers need to manually deploy the code after releasing their build. There are multiple steps to ensure everything is uploaded and managed in a proper manner.
The development and production environment can be a tricky task if not hosted in the same environment i.e. Shared hosting for staging but a dedicated server for production.
Amazon provides a bunch of tools to help fill the gap by automating deployments. You can use their services like Amazon CodePipline that may further be …

Continue Reading →
0

Amazon Elastic File System (Amazon EFS)

Posted by:

EFS is a scalable file storage system that is used with Amazon EC2 Instances in AWS cloud. The storage capacity in EFS is elastic, which means your storage will automatically expand when the data is being written on the file system and vice versa. Amazon EFS uses NFS (version 4.1) protocol just like any other file system available. A single EFS file system can be used by multiple EC2 instances, so you won’t have to worry about syncing or replicating …

Continue Reading →
0

Fighting Email Spoofing

Posted by:

Email spoofing is the creation of email messages with a forged email address. This is a problem in email protocols by design because it does not have any mechanism for authentication, which is why all mail-servers allow modifying the FROM header.
-auth_sender someone@somemailserver.xyz
From:  foo@bar.com
To: janeDoe@bar.com
Subject: Your credit statement
In above example, the user is authenticating with a different account but he modified FROM to look like it originated from another location. Most common users fell for such …

Continue Reading →
0

Improving Website Responsiveness via Efficient Action Plan

Posted by:

Recently, a client encountered an issue regarding the responsiveness of his website. He was of the view that his website initially worked very smoothly but then all of a sudden failed to do so.
After initial assessment 24/7 Network Engineers came to know that his website was getting 25,000 unique visitors per day. It was a huge number considering that he was hosting it off a very small VPS. Also, the loading speed of website was slow.
24/7 Network Engineers …

Continue Reading →
0

Replacing MySQL with MariaDB

Posted by:

In reality, sysadmins and developers prefer MariaDB because its community is derived from the same MySQL code and has additional features than MySQL. MySQL is more popular than MariaDB, which is lesser known but is considered a better alternative.
MariaDB supports more storage engines, cutting edge features, and better clustering support including active-active master clustering and is compatible with MySQL. It also has better performance and is powerful in large clusters or where master-master replication is required.
One of the …

Continue Reading →
0

Capacity Provisioning for Amazon Web Services

Posted by:

Capacity Provisioning is one of the most vital concepts in the Hosting Industry. It is widely expanding (or shrinking) the infrastructure on which any web application can be deployed with a little or no delay. Conventionally, one used to acquire hardware, provision it with the required Operating System and then configure it before adding to the existing grid.
But the introduction of cloud computing, such as AWS Elastic Beanstalk have made it much easier to handle with the hassle of …

Continue Reading →
0

Strengthening the Email Delivery for a Transactional Website

Posted by:

Online Shopping has become the talk of the town  these days and the number of online shoppers is growing day by day. With the online shopping luxuries like smartphones, credit cards and other easy payment solutions, it has spread worldwide. The comfortable payment solutions and the higher quality standards are the prime reasons for people drifting from traditional shopping practices to online shopping. In the whole online shopping mechanism, the delivery of all online orders, their confirmations and the whole record-keeping in this …

Continue Reading →
0

How to Locate a Specific Log Entry in ModSecurity Audit Log

Posted by:

ModSecurity is an open source, versatile and cross-platform web application that protects a website from all possible security threats. The application also keeps extensive audit logs and can be installed with Apache & NGINX web servers. It is fundamentally used to block potential exploits with the help of Regular Expressions.
ModSecurity, being an effective element of the cPanel/WHM can identify and remove the commonly known code injection that in turn improves the overall security of the server. In an ideal …

Continue Reading →
0
Page 2 of 4 1234

# #