Here are some technology focused articles from our featured authors.

Availability is a fundamental requirement of Security

When people talk about security, they often picture confidentiality and integrity in their mind. However, the role of availability is equally important while defining the security. In fact, the term security is defined as a combination of confidentiality, integrity and availability by major standards and certifications. There is a quote on a lighter tone in …

Continue reading “Availability is a fundamental requirement of Security”

The post Availability is a fundamental requirement of Security appeared first on Raju Alluri.

authbind vs iptables on AWS

Here is a short description of the scenario I was working on. I am using a standard AWS AMI to run tomcat (tomcat7, to be specific.) The default configuration of AWS AMIs (and many other off-the-shelf unix based servers) is such that tomcat (or any other program that runs with a non-superuser credentials) can’t bind … Continue reading authbind vs iptables on AWS

The post authbind vs iptables on AWS appeared first on Raju Alluri.

authbind vs iptables on AWS

Here is a short description of the scenario I was working on. I am using a standard AWS AMI to run tomcat (tomcat7, to be specific.) The default configuration of AWS AMIs (and many other off-the-shelf unix based servers) is such that tomcat (or any other program that runs with a non-superuser credentials) can’t bind …

Continue reading “authbind vs iptables on AWS”

The post authbind vs iptables on AWS appeared first on Raju Alluri.

Data Insurance: to Limelight and Mainstream

In contrast with other essential elements of human life like death and taxes, the history of insurance has been very short. However, in terms of evolution, the concept of insurance has been constantly changing and continuously embracing new domains. Insurance of properties, life, health, beauty, athletic talent and limbs are very trivial now. Data insurance, … Continue reading Data Insurance: to Limelight and Mainstream

The post Data Insurance: to Limelight and Mainstream appeared first on Raju Alluri.

Data Insurance: to Limelight and Mainstream

In contrast with other essential elements of human life like death and taxes, the history of insurance has been very short. However, in terms of evolution, the concept of insurance has been constantly changing and continuously embracing new domains. Insurance of properties, life, health, beauty, athletic talent and limbs are very trivial now. Data insurance, …

Continue reading “Data Insurance: to Limelight and Mainstream”

The post Data Insurance: to Limelight and Mainstream appeared first on Raju Alluri.

libressl

Libressl (http://www.libressl.org/) is a recent fork of OpenSSL. The goal of libressl is to provide a more secure alternative to openssl and the developers who forked the code feel that openssl is beyond repair at this point. Quoting from libressl website, LibreSSL is a version of the TLS/crypto stack forked from OpenSSL in 2014, with … Continue reading libressl

The post libressl appeared first on Raju Alluri.

libressl

Libressl (http://www.libressl.org/) is a recent fork of OpenSSL. The goal of libressl is to provide a more secure alternative to openssl and the developers who forked the code feel that openssl is beyond repair at this point. Quoting from libressl website, LibreSSL is a version of the TLS/crypto stack forked from OpenSSL in 2014, with …

Continue reading “libressl”

The post libressl appeared first on Raju Alluri.

Shellshock bug and the risks

Bash, the quarter century old shell utility on almost all popular unix based systems, is found to be vulnerable. The exploit works by injecting specially crafted values into an environment variable and using it to invoke a shell command. Once the exploit gets to that level, there is hardly any limit on what can be … Continue reading Shellshock bug and the risks

The post Shellshock bug and the risks appeared first on Raju Alluri.

Shellshock bug and the risks

Bash, the quarter century old shell utility on almost all popular unix based systems, is found to be vulnerable. The exploit works by injecting specially crafted values into an environment variable and using it to invoke a shell command. Once the exploit gets to that level, there is hardly any limit on what can be …

Continue reading “Shellshock bug and the risks”

The post Shellshock bug and the risks appeared first on Raju Alluri.

Upcoming AWS / EC2 instance reboot

If you are using AWS and EC2 instances, a reboot of most those instances is on the horizon. Amazon’s AWS informed of this reboot that is scheduled between 02:00 GMT on September 26th and 23:59 GMT on September 30th. Read more about this reboot on Gigaom and Rightscale. Technical Forums on AWS and other sites … Continue reading Upcoming AWS / EC2 instance reboot

The post Upcoming AWS / EC2 instance reboot appeared first on Raju Alluri.