System and network administrators in order to protect IT and business company from hacker attacks should have a minimal knowledge about web application penetration testing. This why no one is free to hacker attacks and thinking that hackers are not interested to our website is not good reason for not taking right security actions because, for example, it could be ..
This article explains how to use openssl for creating, converting and managing the all possible type of ssl certificates looking inside the CA and the certificates. The discussion is divided into three sections: certificate understanding, creating and managing ssl certificate and converting ssl certificate. Let’s start with the first section. SSL Certificate understanding A ssl certificate is ..
In this article I show three different reverse proxy architectures based on nginx for implementing a high availability reverse proxy environment. As load balancer two different solutions are proposed: one with haproxy, an application load balancer; another with keepalived, a layer 3 load balancer. Before starting, let me explain what is a reverse proxy. Reverse proxy is a proxy ..
TCP protocol is the heart of internet. Good tcp understanding is basic requirement for system and network administrators for resolving fastly network problems. Why do we receive RST? Why is the connection in time out? The server is down or the traffic is blocked by firewall? Is there some routing asymmetric? We can fastly answer with ..