The Strategies#
Securing your website begins with
It’s also important to adopt principles like
While adding layers of complexity can enhance protection, relying solely on secrecy is risky if those hidden details are ever discovered.
For example, if someone has unrestricted access to your systems —- whether physically or remotely —- your defenses won’t hold up.
By sticking to these strategies, focusing on the essentials, and simplifying the approachs, we can create a website that is better protected against today’s threats.
- Essential Security
- Security_through_obscurity, not security_by_obscurity
- Simplify Cybersecurity
- Ten Immutable Laws of Security (by Microsoft)
Mozilla.org#
Tools Development#
All tools and utils that developed are stored at myseq
@github.
Utils ≠ Tools#
Utility is not same as tool. Utilities are small program that brings fun and quick solution to some problems. I’ve put all the utilities that I created at GitHub repo at MySeq/utils:
Open Source#
Currently, I am busy at R&D and learn everything about clouds …
Research#
/etc/services
:restconf 80/tcp restconf 443/tcp netconf 830/tcp #ssh
- RESTCONFG Protocol
- Comparing NetConf, RESTConf, gNMI
- NETCONF and RESTCONF
- CCNP Enterprise: What are YANG, NETCONF & RESTCONF?
- NETCONF: Introduction To An Emerging Networking Standard
Development#
- WSL settings configuration
- TaiPy
- Taipy-GPT4-Demo
- Build stunning Data Science WebApp
- Turn Data/AI algorithm into full WebApp
- Hugo
- Get up and running with large language models locally.
REST API#
Public API (VM)#
Site | Links |
---|---|
CISA_KEV | https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json |
RHA_CVE | https://access.redhat.com/hydra/rest/securitydata/cve/<CVE-2024-2961>.json |
MSRC | https://api.msrc.microsoft.com/cvrf/v3.0/cvrf/<2024-aug> |
SUSE_VEX | https://ftp.suse.com/pub/projects/security/csaf-vex/<cve-2023-46842>.json |
Oracle_CPU | https://www.oracle.com/docs/tech/security-alerts/<cpujul2024csaf>.json |
Cybersecurity#
- Project Discovery - Democratize security, together
- ProjectDiscovery Blog
Clouds#
Kubernetes (k8s)
Cloud Security
- Kubernetes Security: 8 Best Practices to Secure Your Cluster
- Container Security: 8 Best Practices You Must Know
- [Docker Security: 5 Risks and 5 Best Practices for Securing Your Container](https://www.tigera.io/learn/guides/container-security-best-practices/docke r-security/)