Tumgik
#secure cd
opsmxspinnaker · 1 year
Text
Tumblr media
0 notes
chipistrate · 10 months
Text
Tumblr media
Why is this so... familiar?
Back on my patient 46 bullshit<3
650 notes · View notes
obeetlebeetle · 5 months
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
tagged by @sophelstien, thank you!💜💜💜
the NO-SKIP albums: a tag game 🎶
rules: share the albums that you can listen to nonstop. those lightning in a bottle-albums that scratch ur brain just right. every single track, an absolute banger. u could not skip one if u tried. no notes. stunning, show-stopping, immaculate. ur no-skip albums. 🔎 bonus & optional (but imo, v fun) rules:1) add a track rec for us to listen to! AND2) share ur favorite line(s) from that track! 👀
tagging @waitingforgalois, @avantguardisme, @frogndtoad, @oranges-and-pears, @phosphorusandpetra, @cardwrecks, @swordatsunset, @gideonthefirst, @owldude, and YOU
🎧 album info/track recs/my favorite lines under the cut!! ↓↓↓
🌊 hideaway / the weepies (2008)
track rec: little bird ↳brush your gray wings in my head / say what you said / say it again / they tell me I'm crazy / but you told me / I'm golden
📼 in rainbows / radiohead (2007)
track rec: weird fishes/arpeggi ↳I'd be crazy not to follow / follow where you lead / your eyes / they turn me / turn me into phantoms / I follow to the edge / of the earth / and fall off / yeah, everybody leaves / if they get the chance / and this is my chance
🌉 narrow stairs / death cab for cutie (2008)
track rec: bixby canyon bridge ↳and then it started getting dark / I trudged back to where the car was parked / no closer to any kind of truth / as I must assume was the case for you
🚗 sam's town / the killers (2006)
track rec: bones ↳we took a backroad in my car / down to the ocean / it's only water and sand / and in the ocean we'll hold hands / but I don't really like you / apologetically dressed in the best / put on a heartbeat glide / without an answer / the thunder speaks for the sky
🕕 I forget where we were / ben howard (2014)
track rec: conrad ↳oh, I loved you with the good and the careless in me / but it all goes back
🔥 heretic pride / tmg (2008)
track rec: autoclave ↳when I try to open up to you, I get completely lost / houses swallowed by the earth, windows thick with frost / and I reach deep down within, but the pathways twist and turn / and there's no light anywhere, and nothing left to burn / and I am this great, unstable mass of blood and foam / and no emotion that's worth having could call my heart its home
🌹 violet street / local natives (2019)
track rec: when am I gonna lose you? ↳I remember you closing the shutters / and laying down by my side / and the light that was still slipping through / it was painting your body in stripes
🚪 retired from sad, new career in business / mitski (2013)
track rec: goodbye, my danish sweetheart ↳there's some kind of burning inside me / it's kept me from falling apart / and I'm sure that you've seen what it's done to my heart / but it's kept me from falling apart / now here I lay as I wonder about you / would you just tell me what I'm meant to do? / 'cause I've waited and watered my heart 'til it grew / you can see how it's blossomed for you
🚀 how to: friend, love, freefall / rks (2018)
track rec: mission to mars ↳we changed the format completely, cut the filler for meat / it's just blood on your TV making killings for free / the ticket lines are past the sign down at the end of the street / meet and greet, VIPs go a million a piece / we delayed the show for entry and so expired on the lease / now we're gonna re-release it, t.b.d / change the title to: fuck you / it's what you want it to be / when you know it only pay to make nice / pack your shit and standby, please / your friends are trying to leave and get high
20 notes · View notes
killjoy-prince · 2 months
Text
Trying on the cosplays imma wear to a con in a month and getting excited that ill be cosplaying said characters in a month
#prince's talk tag#yo its gonna be so fun!!#im doing h/omura‚ p/ers/ona3 protag and my boy rui in that order#h/omura was supposed to be a duo with my friend (they were to cosplay her gf)#but theres a s/tar r/ail meetup that same day and there wasnt one last year and they wanted to go so they're gonna do that instead#and the other two days i have cosplay meetups i wanna do so there went that#but its ok i know my friend really wanted a meetup last year so im happy theyre getting one this year#imma show up to the p/r/s/k one again and give out extras I get from buying the cd singles bc i dont need all these#plus i wont just be in his school uniform i bought his new troupe outfit so ill be in that!!#and for the protag i got his new battle uniform from the remake so thatll be fun!!#i brought an evoker prop but i need to find like orange tape to put around the muzzle so they know its fake and it cant shoot#the picture showed it with it on so i thought it would come with it but nope!#gotta hope security will be find with the tape on it#like it literally can't shoot the trigger doesn't move its just meant to be posed with#we'll see i guess#i was looking at the panels and i saw some that interest me but ill doubt ill go to bc knowing me ill spend my time in artist alley#but there was one i was really interested in but its at the same time as one of the meetups so i have to forgo it OTL#its a manga industry panel. i went to one at a different con like 9 years ago and i learned a lot about how they publish and print manga#so i kinda wanted to see how other companies do it if theres a difference#tho there is a manga lettering panel the next day and that doesnt interfere with anything so maybe ill do that one if anything#bc i have a love-hate relationship with type#man i can't wait for next month!!
13 notes · View notes
spockvarietyhour · 1 year
Text
Tumblr media Tumblr media Tumblr media
Great attempt at showing us what would be a DVD player but is in actuality a 25-Disc Changer
Tumblr media
14 notes · View notes
rorygilmcre · 8 months
Text
I'm still in shock
3 notes · View notes
Text
Building a Modern Web Application: A Comprehensive Guide
Unlock the secrets of building a modern web app with React.js, Java, and MongoDB! 🚀 Dive into component-based design, caching strategies, and deployment excellence. #WebDevelopment #ReactJS #SpringBoot #MongoDB #TechBlog
Building a modern web application requires a strategic approach to frontend and backend development. By combining React.js for the frontend, Java with Spring Boot for the backend, and MongoDB as the database, we can create a scalable and efficient architecture. This guide will walk you through each step of the development process, from frontend design to backend implementation and database…
Tumblr media
View On WordPress
2 notes · View notes
atlasghoul · 2 years
Text
sometimes im convinced awsten knight’s existence is a large and ongoing social experiment
8 notes · View notes
sbnkalny · 2 years
Text
Stegg the soul is both a CD and a dvd, in order to show solidarity ( ͡☉ ͜ʖ ͡☉)
3 notes · View notes
faisalakhtar12 · 3 days
Text
Building Your Serverless Sandbox: A Detailed Guide to Multi-Environment Deployments (or How I Learned to Stop Worrying and Love the Cloud)
Introduction Welcome, intrepid serverless adventurers! In the wild world of cloud computing, creating a robust, multi-environment deployment pipeline is crucial for maintaining code quality and ensuring smooth transitions from development to production.Here is part 1 and part 2 of this series. Feel free to read them before continuing on. This guide will walk you through the process of setting…
0 notes
Text
1 note · View note
touchaheartnews · 2 months
Text
Security Meeting: Hoisting Foreign Flags in Nigeria Deemed Treasonous – CDS
In a recent high-level security meeting, Nigeria’s Chief of Defense Staff (CDS) declared that hoisting foreign flags within the country constitutes a treasonable offence. This assertion underscores the government’s firm stance on national sovereignty and security, reflecting broader concerns about the integrity and unity of the Nigerian state. The CDS’s statement comes at a time when Nigeria is…
0 notes
immaculatasknight · 2 months
Link
The Borg is here
0 notes
jcmarchi · 2 months
Text
AI-powered WAFs vs traditional firewalls: Protecting your web applications - AI News
New Post has been published on https://thedigitalinsider.com/ai-powered-wafs-vs-traditional-firewalls-protecting-your-web-applications-ai-news/
AI-powered WAFs vs traditional firewalls: Protecting your web applications - AI News
.pp-multiple-authors-boxes-wrapper display:none; img width:100%;
If your business relies on web applications, you’re probably familiar with traditional network firewalls. And for good reason – they play an invaluable role filtering external threats looking to attack your overall infrastructure. But as more and more of your essential operations shift online to intricate web apps and APIs, gaps have opened up that basic firewalls simply can’t see into. The new AI-powered threats of today demand a new approach to security.
Without visibility into your custom application logic and data flows, major vulnerabilities can be exploited, allowing sensitive information theft, financial fraud, and even operational disruption. While you still need perimeter firewall defenses, exclusively relying on them to safeguard increasingly powerful web properties leaves you playing a risky game of chance (with very real consequences).
By adding specialised web application firewalls (WAFs) designed to analyse requests in the full context of your app environments – and enhanced by AI for even greater accuracy – you can lock things down and confidently build out advanced digital capabilities. With a layered defense-in-depth approach combining network and application-level protections, you can securely deliver the types of seamless, personalised digital experiences that form the foundation of lasting customer relationships and operational excellence in 2024.
Gaps in traditional firewall defences
The chances are you already have traditional firewall protection guarding your overall network (if you run any online services). These firewalls filter incoming traffic based on a set of predefined rules focused primarily around protocol, port number, IP address ranges, and basic connection state.
For example, common firewall rules restrict outside access to private intranet resources, block unwanted traffic types like online gaming protocols, detect large-scale network scans, and mitigate distributed denial of service (DDoS) attacks.
This perimeter protection works well for classic network-focused cyberthreats. But a traditional firewall lacks context about the application logic, user workflows, and data structures unique to custom web apps and APIs. It simply scans network packets as they arrive and attempts to allow or block them accordingly. This leaves it vulnerable to the evolving tactics of AI-powered attackers.
Without insight into application internals, major vulnerabilities can sneak right past traditional firewall defences:
SQL injection attacks: Inserting malicious code allowing remote access, data destruction, or information theft
Broken authentication: Enabling unauthorised system access with stolen credentials
Sensitive data exposure: Through improper encryption, backups, or logging
Cross-site scripting (XSS): Injecting JavaScript or HTML to spread malware, hijack sessions, scrape data, or deface sites
Hackers can also target configuration issues, flawed business logic flows, identity management gaps, and unsafe object level access once inside applications themselves. AI-powered attacks can exploit these vulnerabilities with alarming speed and precision—and your firewall wouldn’t see it coming.
These exploitable application flaws allow attackers to steal sensitive business data and personal information, mine cryptocurrency illicitly on servers, hold systems ransom, take over client accounts, and both deny legitimate access and destroy backend resources. AI has only amplified these risks.
Still, traditional firewalls remain extremely important as the first line of network perimeter defence. But for companies conducting operations online through modern web apps, additional safeguards tuned to application threats – and bolstered by AI’s threat detection capabilities – are essential.
Why WAFs provide critical protection
Web application firewalls address the application layer vulnerabilities and holes in logic that basic network firewalls miss. WAFs are designed specifically to protect web apps, APIs, microservices, and rich internet applications. AI further enhances their ability to identify and respond to these threats.
A WAF will deeply inspect all traffic flowing to web properties using targeted rulesets and negative security models defining suspicious behaviour. From there, they analyse requests for indicators of common exploits and attacks seeking to abuse application behaviour and functionality. AI-powered analysis can detect subtle patterns that might otherwise go unnoticed. These might include:
Extreme traffic spikes indicating possible DDoS events
Suspicious geolocations of an IP addresses
Repeated input submissions just below lockout thresholds
Unusual HTTP headers, user agents, or protocols
Known malicious payloads in POST requests
Attempts to traverse directory structures in unpredictable ways
Special characters and patterns indicating SQL injection or cross-site scripting
Advanced WAFs combine this real-time threat detection with global threat intelligence to identify emerging exploits and bad actors as soon as new attack patterns appear. AI and machine learning algorithms even allow some solutions to derive additional behavioral rules by examining your specific application traffic patterns over time. AI’s adaptability is crucial in this constantly shifting landscape.
As traffic passes through, the WAF blocks dangerous requests while allowing legitimate users through with minimal latency impact. This protects the application itself, shielding both data and functionality from compromise. AI-powered WAFs can do this with remarkable speed and accuracy, keeping pace with the ever-changing threat landscape.
Most WAF products also include capabilities like virtual patching, behavioral anomaly detection, automatic policy tuning, third-party integration, and positive security models for detecting verified use cases.
Breaking down the key features of traditional firewalls vs WAFs
Feature Traditional Firewall Web Application Firewall (WAF) Layer of operation Network (Layer 3/4) Application (Layer 7) Traffic analysis Packets, ports, IP addresses HTTP/HTTPS requests, content, parameters, headers Attack protection Network-level attacks Web application-specific attacks (SQLi, XSS, CSRF, etc.) Customisation Limited Extensive Additional capabilities May offer basic intrusion prevention Often include bot mitigation, DDoS protection, API security AI integration Limited or non-existent Considerably more prevalent. Used to enhance threat detection and and incident response
Creating an application security ladder
Web applications underpin many essential business capabilities – internal operations management, customer experience, partner integration – the list goes on. As reliance on these application ecosystems grows, so does business risk exposure through underlying vulnerabilities.
Strengthening application security closes major blindspots while allowing companies to pursue advanced digital transformation supporting key goals around:
Improving self-service and convenience through customer portal expansion
Accelerating development velocity using CI/CD pipelines and microservices
Enabling real-time data exchanges through IoT integrations and open API ecosystems
Increasing revenue with personalised interfaces and recommendation engines
Combining network-layer perimeter defences from traditional firewalls with reinforced protections from specialised WAFs creates a security ladder effect. The traditional firewall filters allowed traffic at the network level based on IPs, protocols, and volume heuristics. This protects against basic attacks like worms, reconnaissance scans, and DDoS events.
Then the WAF takes over at the application layer, scrutinising the full context of requests to identify attempts to exploit app logic and functionality itself using injection attacks, stolen credentials, unusual workflows, or other sneaky techniques security teams encounter daily.
Together, this layered defence-in-depth approach secures both the overall network and the intricate web apps conducting an ever-larger percentage of essential business. Companies can then direct more development resources towards advancing capabilities rather than just patching vulnerabilities.
Final word
The costs of security incidents grow more severe year over year. And as companies rely increasingly on web apps to manage operations, serve customers, and drive revenue, application vulnerabilities present a serious (and immediate) business risk.
Protecting systems with advanced application-aware defenses – powered by AI – means that your security supports rather than gets in the way of your key strategic initiatives
With scalable and secure defenses guarding your web properties, you can confidently build capabilities supporting goals around better customer experience, smoother operations, increased sales growth, and expanded partner channels. In other words, you can focus on pushing your business forward with the peace of mind knowing that you’ve done your part in securing your perimeter and web apps in our ever AI-driven world.
0 notes
anusha-g · 6 months
Text
What is the role of a DevOps approach in cloud migration?
A DevOps approach plays a crucial role in cloud migration by facilitating a seamless transition and optimizing the operational efficiency of cloud environments. Here's how:
Automation: Streamlines tasks like provisioning and deployment.
CI/CD: Enables rapid and frequent updates to applications.
Infrastructure as Code (IaC): Ensures consistency and scalability.
Collaboration: Breaks down silos, fosters teamwork.
Monitoring and Feedback: Provides insights for continuous improvement.
Security and Compliance: Integrates security measures into the pipeline.
DevOps optimizes the migration process, ensuring efficiency, agility, and security in cloud environments.
0 notes
gamesatwork · 6 months
Text
e459 — Pendulums in the Stack
AI generated music with Suno.ai, an early look at the US DOJ complaint against Apple, pendulums as a source of randomness and a plethora of security and privacy articles.
Photo by engin akyurt on Unsplash Published 25 March 2024 Andy and both Michaels get together to talk tech — focusing on AI generated music, security & privacy.   Starting off with the news about Suno.ai, the co-hosts discuss what generative AI music might be like, and what it may mean from a copyright perspective.  This prompts Michael M to remember the Wired CD published in 2004,…
Tumblr media
View On WordPress
0 notes