Skip to main content

Posts

Showing posts from 2020

gRPC in .NET Core

 gRPC in .NET Core Source: https://docs.microsoft.com/en-us/aspnet/core/tutorials/grpc/grpc-start?view=aspnetcore-5.0&tabs=visual-studio-code Create a gRPC service dotnet new grpc -o GrpcGreeter code -r GrpcGreeter dotnet dev-certs https --trust CTRL+F5 Create a gRPC client dotnet add GrpcGreeterClient.csproj package Grpc.Net.Client dotnet add GrpcGreeterClient.csproj package Google.Protobuf dotnet add GrpcGreeterClient.csproj package Grpc.Tools Copy the Protos\greet.proto from the server. edit: option csharp_namespace = "GrpcGreeterClient"; Edit: GrpcGreeterClient.csproj <ItemGroup>      <Protobuf Include="Protos\greet.proto" GrpcServices="Client" /> </ItemGroup> Edit: Program.cs using   System ; using   System . Threading . Tasks ; using   Grpc . Net . Client ; namespace   GrpcGreeterClient {      class   Program     {          static   async   Task   Main ( string []  args )         {              // The port number(5001) must ma

Gettting stored Wifi connections passwords in Windows

Gettting stored Wifi connections passwords in Windows Read WiFi passwords You can read WiFi passwords for networks you have been connected to. If you don’t know a network name, you can check saved profiles with the following command: netsh wlan show profiles Once you know the network name, execute this command: netsh wlan show profile name=[NETWORK NAME] key=clear

ISO 27001

 ISO 27001 source: https://courses.elearning.tecnico.ulisboa.pt/courses/course-v1:MOOCs+ISO27001X+2020/about 1. Information Information is an asset, stored in paper, digital or in peoples brains. CIA Information properties: Confidentiality, Integrity and Availability 2. Information Security Management Information Security The preservation of confidentiality, integrity and availability of information. Information Security Management Is managed by implementing controls that protect the information assets. 3. Information Security Management System Information Security Management System ISMS is systematic approach to: establishing implementing operating monitoring reviewing maintaining improving the organization's information security. ISMS is based on risk assement to effectivly treat and manage risks, using policies, procedures, guidelines and associated resources and activities. Benefits Greater protection of information against more threats Structural approach for managing informat

API Security Architect

API Security Architect source: https://apiacademy.co/category/api-tutorials/api-security/ 1. Introduction to API security 1.1 API Audience Private, Public, Partner 1.2 API Security Domain EndUser, Administrators, Developers - several interconnection endpoints APIs increase the attack surface  1.3 Common Web Attacks Cross-Site Scripting Denial of Service Man in the Middle Cross-Site Request Forgery SQL Injection Overflow     Security organization: OWASP Open Web Application Security Project 1.4 Mitigating API Threats Rate Limiting Message Validation Encryption and Signing TLS Trust Attacks Certificate Authority Vulnerabilities Human Vulnerabilities Man in the Middle Access Control HTTP Access Control Basic Authentication Digest Authentication 1.5 Best Practices for API Security Security - Authentication and Authorization Protection - OWASP API vulnerabilities Throttling - quota on requests and retries Continuous API Monitoring Resquest/Response Payload Validation Error Handling 2. Intro

How To Set Permanent DNS Nameservers in Ubuntu and Debian

How To Set Permanent DNS Nameservers in Ubuntu and Debian source: https://www.tecmint.com/set-permanent-dns-nameservers-in-ubuntu-debian/ Install $ sudo apt install resolvconf $ sudo systemctl status resolvconf.service $ sudo systemctl start resolvconf.service $ sudo systemctl enable resolvconf.service $ sudo systemctl status resolvconf.service Configure $ sudo nano /etc/resolvconf/resolv.conf.d/head add nameserver 1.1.1.1 nameserver 1.0.0.1 system restart $ sudo systemctl start resolvconf.service

Exam AZ-900: Microsoft Azure Fundamentals

Exam AZ-900: Microsoft Azure Fundamentals https://docs.microsoft.com/en-us/learn/certifications/exams/az-900 1. Cloud Concepts - Principles of cloud computing https://docs.microsoft.com/en-us/learn/modules/principles-cloud-computing/ 1.1 Infrastructure as a service (IaaS) Infrastructure as a Service is the most flexible category of cloud services. It aims to give you the most control over the provided hardware that runs your application (IT infrastructure servers and virtual machines (VMs), storage, and operating systems). Instead of buying hardware, with IaaS, you rent it. It's an instant computing infrastructure, provisioned and managed over the internet. 1.2 Platform as a service (PaaS) PaaS provides an environment for building, testing, and deploying software applications. The goal of PaaS is to help you create an application quickly without managing the underlying infrastructure. For example, when deploying a web application using PaaS, you don't have to install an operati

Exam AZ-204: Developing Solutions for Microsoft Azure

Exam AZ-204: Developing Solutions for Microsoft Azure https://docs.microsoft.com/en-us/learn/certifications/exams/az-204 1. Create serverless applications https://docs.microsoft.com/en-us/learn/paths/create-serverless-applications/ 1.1 Choose the best Azure service to automate your business processes https://docs.microsoft.com/en-us/learn/modules/choose-azure-service-to-integrate-and-automate-business-processes/ Technologies Logic Apps  Logic Apps is a service within Azure that you can use to automate, orchestrate, and integrate disparate components of a distributed application. By using the design-first approach in Logic Apps, you can draw out complex workflows that model complex business processes. The following screenshot shows the Logic Apps Designer and design canvas that you use to define your workflow. Microsoft Power Automate  Microsoft Power Automate is a service that you can use to create workflows even when you have no development or IT Pro experience. You can create workflo

API Designer

API Design source:  https://apiacademy.co/category/api-tutorials/api-design/ 1. Introduction What is an API Application Programming Interface A software interface, a building block that works behind the scenes to connect different applications and  systems so they can share information. Entry points into your organization's capabilities that can be accessed through different channels such as browsers, mobile apps, social networks, and IoT devices. Are digital enablers Digital feedback loop Business Goals -> Digital Reach -> Business Results -> Data-driven Insigths Benefits and Value of APIs New revenew - monetized access to data and services Reach and retention - reach captive audiences where they spend their time Faster partnerships - partners can onboard in record time Mobile ad omnichannel - consistent digital experience across all channels Interaction analytics - digital feed loop allows real-tims analysis of user behaviour Outsourced innovation - leads to unanticipate

Agile Leadership

Agile LeaderShip Reference: IPMA Reference Guide ICB4 in an Agile World https://www.ipma.world/news/ipma-reference-guide-icb4-agile-world/ 1. Perspective 1.1 Strategy Description: Change Blurred vision Agile strategy Emergent Create and adapt Giving meaning to work Key Competence Indicators Align agile teams with the organisational mission and vision Identify and exploit opportunities to influence organisational strategy Develop and ensure the ongoing validity of the business/organisational justification Determine, assess, and review critical success factors Determine, assess, and review key performance indicators Examples of Measures Reflects the mission and vision of the organisation Identifies new opportunities and threats which could alter the strategy Uses the CSFs for managing stakeholders Uses information systems for strategic performance 1.2 Governance, structures, and processes Description: Challenges Lean organisation Customer value Agile working Different structures Key Comp