security



GitHub OAuth2.0 access for web application

  • avatar
  • 1.2K Views
  • 2 Likes
  • 7 mins read
Preview post image

GitHub is one of the most popular platforms for developers. Millions of developers and companies build, ship, and maintain their software on GitHub. Their platform allows third party websites to use GitHub as registration or login option with just a few clicks. That is the social login and it allows customers to bring their existing social identities and use them to register and log in without creating a new account explicitly. It saves a lot of time for users and makes the life easier as we don't need to remember all those credentials for different websites anymore.

New Firefox privacy feature strips URLs of tracking parameters

  • 1.1K Views
  • 1 Like
  • 1 min read
Preview post image

Mozilla Firefox 102 is released with a new privacy feature that strips parameters from URLs that are used to track you around the web. Many companies utilize custom URL query parameters technique to track clicks on links.

With the release of Firefox 102, Mozilla has added the new Query Parameter Stripping feature that automatically strips various query parameters used for tracking from URLs when you open them, whether that be by clicking on a link or simply pasting the URL into the address bar.

Firefox rolls out Total Cookie Protection by default to all users worldwide

  • 1.1K Views
  • 1 Like
  • 2 mins read
Preview post image

Starting today, Firefox is rolling out Total Cookie Protection by default to all Firefox users worldwide, making Firefox the most private and secure major browser available across Windows, Mac and Linux. Total Cookie Protection is Firefox's strongest privacy protection to date, confining cookies to the site where they were created, thus preventing tracking companies from using these cookies to track your browsing from site to site.

 Join Our Monthly Newsletter

Get the latest news and popular articles to your inbox every month

We never send SPAM nor unsolicited emails

Database server setup: enhancing security and performance

  • avatar
  • 436 Views
  • 6 mins read
Preview post image

Setting up a robust database server is a critical step in ensuring the smooth functioning of applications and safeguarding sensitive data. In the realm of cybersecurity and efficient data management, employing good practices can make a significant difference. This article explores the advantages of segregating application and database servers, emphasizing the importance of allowing only authorized connections. Additionally, we'll discuss the use of SSH tunnels to enhance security and weigh the pros and cons of such a system.

Connecting to remote server using SSH

  • avatar
  • 1.2K Views
  • 1 Like
  • 6 mins read
Preview post image

Secure Shell (SSH) is a protocol that provides secure command-line access to a remote server. By using SSH, you can remotely log in and run commands as if you were sitting right at the server.

The benefit of using SSH over other methods of remote access is that, as the name suggests, communications are securely encrypted, protecting the traffic flowing to and from the server. Data is encrypted at both ends of the client/server connection using a digital security certificate and access credentials are also protected.

How to install and configure Redis on Ubuntu

  • avatar
  • 1.2K Views
  • 7 mins read
Preview post image

Redis is an open-source in-memory key-value data store. It can be used as a database, cache, message broker and supports various data structures such as Strings, Hashes, Lists, Sets, etc... Apart from its performance and flexibility, Redis stands out with its wide language support, high availability, and automatic partitioning.

How to install MySQL 8.0 server on Ubuntu

  • avatar
  • 1.2K Views
  • 1 Like
  • 8 mins read
Preview post image

MySQL is an open-source relational database management system (RDBMS). Its name is a combination of My and SQL the abbreviation for Structured Query Language. A relational database organizes data into one or more data tables in which data types may be related to each other; these relations help structure the data. SQL is a language programmers use to create, modify and extract data from the relational database, as well as control user access to the database.

Allow remote access to MySQL server

  • avatar
  • 1.1K Views
  • 1 Like
  • 6 mins read
Preview post image

Many applications start their web server and database hosted on the same machine. It's simpler, cheaper and easier to manage. However, as our application grows , a setup like this can bring security issues and scalability problems. A common solution is to separate our database from the application: creating a dedicated database server and allowing applications to connect remotely. This setup is more secure, it can provide you a better analysis of the bottlenecks and definitely makes the scalability easier.