by Raju Alluri | Jun 11, 2015 | Brain Dump, Security, Technical
When people talk about security, they often picture confidentiality and integrity in their mind. However, the role of availability is equally important while defining the security. In fact, the term security is defined as a combination of confidentiality, integrity...
by Raju Alluri | Jun 11, 2015 | Brain Dump, Security, Technical
When people talk about security, they often picture confidentiality and integrity in their mind. However, the role of availability is equally important while defining the security. In fact, the term security is defined as a combination of confidentiality, integrity...
by Raju Alluri | Jun 11, 2015 | Brain Dump, Security, Technical
When people talk about security, they often picture confidentiality and integrity in their mind. However, the role of availability is equally important while defining the security. In fact, the term security is defined as a combination of confidentiality, integrity...
by Raju Alluri | Jan 29, 2015 | Security, Technical, Unix/Linux
Here is a short description of the scenario I was working on. I am using a standard AWS AMI to run tomcat (tomcat7, to be specific.) The default configuration of AWS AMIs (and many other off-the-shelf unix based servers) is such that tomcat (or any other program that...
by Raju Alluri | Jan 29, 2015 | Security, Technical, Unix/Linux
Here is a short description of the scenario I was working on. I am using a standard AWS AMI to run tomcat (tomcat7, to be specific.) The default configuration of AWS AMIs (and many other off-the-shelf unix based servers) is such that tomcat (or any other program that...
by Raju Alluri | Jan 29, 2015 | Security, Technical, Unix/Linux
Here is a short description of the scenario I was working on. I am using a standard AWS AMI to run tomcat (tomcat7, to be specific.) The default configuration of AWS AMIs (and many other off-the-shelf unix based servers) is such that tomcat (or any other program that...
Recent Comments