Brian O'Neill

Log4Shell: rethinking your environment and using external code

Log4Shell (CVE-2021-44228) struck fear in many IT departments, CISOs, and vendors - an easily exploitable remote execution vulnerability in a ubiquitous Java module used by many, many applications. Companies are still reeling from the impact and...

DNS Server for Facebook: Why Finding Yours is Vitally Important

When I started writing this article, Facebook had been unavailable to the entire world for over four hours. Not intermittent, not “articles didn’t load”, just non-existent. As in if you type facebook.com, your browser spins for a while and then says...

Finding an AWS Resource Over All Regions

If you have a lot of resources in AWS spread across multiple regions, sometimes it can be cumbersome trying to remember which resources are in each region. For the most part, the AWS Management Console only provides information on a given region. If...

The Business to Scammer (B2Scam) Tactic

You have all gotten spam before. Emails from dying millionaires who want to give you their money, or an official from a deposed government trying to sneak money out of the country, etc. You've all done the right thing and deleted the emails. I hope.

Saving Money With Amazon Web Services Reserved Instances

It seems like a strange thing to come across, but sometimes when you are dealing with clients who are utilizing Amazon Web Services (AWS) for their resources, you find wasted opportunities to save money. Sometimes it is nervousness about performance...

Subscribe Here For Our Blogs:

Categories

see all