Skip to main content

Restricting iFrames in HTML to a specific domains using Nginx

Click here to read

Comments

  1. SimplyHired ranks Job Ads primarily based on a combination of employer bids and relevance, similar to your search phrases and other exercise on SimplyHired. There are no taxes for other types of gambling as a result of|as a outcome of} they are thought of unlawful. Hearst Television participates in numerous web marketing} applications, which implies we 먹튀사이트 먹튀프렌즈 could get paid commissions on editorially chosen merchandise bought through our links to retailer websites.

    ReplyDelete

Post a Comment

Popular posts from this blog

CloudWatch Agent Installation on Ubuntu Bionic

Installing and Configuring AWS CloudWatch agent on Ubuntu 18.04 LTS Using CloudWatch for EC2 instances get you a lot of insight before trying to use third party monitoring solutions. Since it is an integrated service, setting up and make it available is a breeze. Lets see how to do that step by step.

Welcome Message on Linux Systems

 Bored of the default advertisement banners? Let us see how to change the welcome message on most linux systems. There are two ways the message is displayed 1. Before the password prompt 2. After the user is logged in Before, $ sudo nano /etc/issue.net After, $ sudo nano /etc/motd Simple Message for banner This system is for authorized use only. All activities are logged and checked at frequent intervals. Unauthorized individuals attempting to connect to, port-scan, deface, hack, or otherwise interfere with any services on this system will be reported. Now, This will change the banner and the new users would see it. But will disappear when you reboot the system on AWS, Azure and other cloud as the update script will reset it to default. To make the banner permanent, disable the script at /usr/sbin/update-motd by, $ sudo update-motd --disable Or, Open ssh config and enable banners $ sudo nano /etc/ssh/sshd_config Look for "Banner" and update as below #Banner /etc/issue.net Sa...

AWS Security Best Practices

Security Best Practices Security is the key concern on the cloud. While most of the cloud providers do offer industry standard security features, it comes under the ownership of the customer (or in the hands of cloud devops engineers). So security breach is on you.....! Today, we are going to see how to leverage the security features provided by Amazon Web Services Cloud in terms of Infrastructure (the cloud itself) , EC2, VPC, RDS and Identity in general. Infrastructure IAM Usage Root account credentials and its Access and Secret Keys are like Credit Card numbers and can be used for any root level activities once compromised. Instead create and use IAM account with required privileges assigned. For multi-level privileged users with access to sensitive resources and programming interfaces, it is recommended to enable MFA It's more secure to start with a minimum set of permissions and grant additional permissions as necessary, rather than starting with permissions that are too lenie...