In the first part of Ingress & TLS in kubernetes series I have introduced self-signed certificates. The process was entirely controlled by manual actions and
Provision a cluster In this tutorial to setup local cluster I will use kind. Follow this instructions to configure ingress controller (nginx in this example).
In the first post in Netcat series, I have discussed a few basic features this amazing tool has. This time, I will elaborate more on
Despite released 25 years ago, Netcat remains as the fundamental network penetration testing tool. In simple words, Netcat is utility which reads and writes data
Simple configuration which will allow to handle more than one domain by server using NGINX. Edit config files as following: /etc/nginx/sites-available/first-domain.com /etc/nginx/sites-available/second-domain.com It is possible
In most cases, you will probably use SYN scan, however there are circumstances where other types of scanning may be needed. Unfortunately, modern firewalls detect different port
In this series I am going to delve in some theory of port scanning, which is essential of service identification within a TCP\IP network. The most popular
Communication between devices on packet-switched networks is based on items most generically called messages. These pieces of information also go by other names such as
In the real world, protocol often refers to a code of conduct or a form of etiquette. People follow certain rules of behaviour, ceremony etc.
Networks are everywhere, especially in the form of Internet. The Internet has revolutionized our lives to an extent people could not imagine several years ago.