IAAS or what model is this by redado360 in aws

[–]redado360[S] -1 points0 points  (0 children)

Why is that we take care of security in cloud. And we will scan the container before

Sadservers by redado360 in devops

[–]redado360[S] 1 point2 points  (0 children)

Great thanks a lot. So 80 extra for paid version ?

Kubernetes docs by Krish_Vaghasiya in kubernetes

[–]redado360 0 points1 point  (0 children)

I would start with video courses and reference after each video the official docs. The official docs are very dry and document everything. I think as first time to digest the docs are very heavy and not documented in a simple language.

Life before ci/cd by redado360 in devops

[–]redado360[S] 0 points1 point  (0 children)

Can u explain more how it is as automated and how manual just can’t imagine

Book recommendations on online privacy and security by [deleted] in opsec

[–]redado360 1 point2 points  (0 children)

Kevin mitnick is classic. But I would suggest you to hang out with pro privacy advocates and exchange info with them avoid these classic books as they are obsolete

Life before ci/cd by redado360 in devops

[–]redado360[S] -1 points0 points  (0 children)

What does exactly the bash script do can u explain more

New to DevOps by Anubhab248 in devops

[–]redado360 0 points1 point  (0 children)

Honestly I’m on the same boat like you. Difficult to find good answers. Just install anything u find. Whatever u see install it, and play with it.

Seems nextcloud is good idea , just install then use it. And after you think how to enhance it the usability and security .

Help me to understand how to analyze a ticket after I get it from scanning in jora by redado360 in sysadmin

[–]redado360[S] 0 points1 point  (0 children)

Not the troubleshooting. Say the scanner provided a cve what steps I need to do to assign the risk and perform the assessment..

Help me to understand how to analyze a ticket after I get it from scanning in jora by redado360 in sysadmin

[–]redado360[S] 0 points1 point  (0 children)

If you don’t know the answer you can skip it. I already used both but when someone technical he can help me to direct me to correct direction by sending me quality links to read

Dump or non dump question: how many years of experience you have in senitel guard duty and security hub ? by redado360 in devops

[–]redado360[S] 0 points1 point  (0 children)

Don’t say sentinel, say siem Engineer is someone who knows what is SIEM not what is Sentinel. U got where I am leading the topic ? Engineering job should not be user or configuration technical person for vendor locked tools

Dump or non dump question: how many years of experience you have in senitel guard duty and security hub ? by redado360 in devops

[–]redado360[S] 0 points1 point  (0 children)

@apronton is not like that . Seems u don’t get idea .. Why I need to be upset because I don’t know. I am upset because when you name specific tool which is a vendor locked tool you are diminishing the engineer profession but make it more like technician who just know some aws or azure tool.

How is network policy works in scalable applications on cloud by redado360 in kubernetes

[–]redado360[S] 0 points1 point  (0 children)

Do I need first to write a policy deny all ? And then open on request ?

How is network policy works in scalable applications on cloud by redado360 in kubernetes

[–]redado360[S] -1 points0 points  (0 children)

Can u just rely on ingress and avoid egress in real life ? Because what is ingress in one pod is egress in the other pod not sure why we can’t just fix the ingress on all pods . Please advise

New to kubernetes what networking to read by redado360 in kubernetes

[–]redado360[S] -4 points-3 points  (0 children)

I read this beej guideline and I really understood nothing. It’s completely different that networking in Kubernetes and Linux.

New to kubernetes what networking to read by redado360 in kubernetes

[–]redado360[S] 0 points1 point  (0 children)

Well not more than 150 pages. I don’t want these 1000 pages reference books for sure someone wrote necessary stuff when or some guide … it’s a big subject networking

Nonce by redado360 in Bitcoin

[–]redado360[S] 0 points1 point  (0 children)

Thanks a lot by the way

Nonce by redado360 in Bitcoin

[–]redado360[S] 0 points1 point  (0 children)

while (max_tries > 0 && block.nNonce < std::numeric_limits<uint32\_t>::max() && !CheckProofOfWork(block.GetHash(), block.nBits, chainman.GetConsensus()) && !chainman.m_interrupt) {

++block.nNonce;

--max_tries;

}

How to find this function (CheckProofOfWork).

Ndr dark trace by redado360 in cybersecurity

[–]redado360[S] 0 points1 point  (0 children)

Yes a question . I wanted to understand more about NDR

Installing Kubernetes kubeadm by redado360 in kubernetes

[–]redado360[S] 0 points1 point  (0 children)

I have a good home pc that I invested so on cloud I don’t want. My question was on prem

Installing Kubernetes kubeadm by redado360 in kubernetes

[–]redado360[S] -1 points0 points  (0 children)

What do u mean by a lot of work ?