Deepak SharmaAutomating CI/CD with AWS: Using CodeCommit, CodeBuild, and CodeDeploy to Build, Publish, and…In this article, we will learn about a project where AWS CodeCommit is used to manage our source code, and AWS CodeBuild automates the…6d ago6d ago
Deepak SharmaAWS Load Balancing Demystified: Configuring ALB to Route to EC2In this article, we’ll explore how to configure a web server and set up an AWS Application Load Balancer (ALB) to efficiently distribute…Oct 25Oct 25
Deepak SharmaUnlocking the Secrets of PKI: A Deep Dive into Cryptographic SecurityAs we learned in previous articles about symmetric key encryption and asymmetric key encryption. Symmetric encryption is fast and efficient…Oct 16Oct 16
Deepak SharmaCryptography Under the Hood: How Modes of Operation Strengthen EncryptionIn the last article, we understood symmetric and asymmetric key encryption, and in this article, we will learn about different modes of…Oct 9Oct 9
Deepak SharmaUnlocking the Power of Digital Signatures: A Guide to Authentication and SecurityA digital signature is a mathematical method that verifies the authenticity of a digital document or message. It’s an electronic, encrypted…Sep 25Sep 25
Deepak SharmaSecuring Your Data: An In-Depth Look at Hashing and Integrity VerificationIt is the process of transforming an input (or “message”) into a fixed-size string of bytes, typically represented as a hexadecimal number…Sep 18Sep 18
Deepak SharmaCreating a Robust WordPress and MySQL Architecture By Docker-ComposeCompose simplifies the control of your entire application stack, making it easy to manage services, networks, and volumes in a single…Apr 11Apr 11
Deepak SharmaHow Kubernetes is used in industries & it’s use casesIn this article , You will learn about the kubernetes and what are the challenges solved by kubernetes. Kubernetes is an container…Jan 1Jan 1