Hi there, I'm Dikky Ryan I'm a Single Fighter Pentester! 🔭 I’m currently working on a ton of project bug bounty! 🌱 I’m currently learning about Cloud Security,Security Analyst,Digital Forensics specially CloudFollow
This article explains Virtual Private Cloud (VPC), a virtual network environment that allows users to create isolated and customizable network resources within a public cloud infrastructure.
This article explains SMS Gateway, a technology that enables the sending and receiving of Short Message Service (SMS) messages between devices, systems, and applications.
This article provides an in-depth explanation of Jenkins, an open-source automation tool written in Java.
This article provides a step-by-step guide to securing a Linux server using Snort, an open-source Network Intrusion Detection System (NIDS).
This article outlines various security features and best practices to protect data from attacks while using Alibaba Cloud.
This article discusses the benefits of microservice practices in Serverless.
This article describes some technical principles and effects of SAE in terms of Serverless, IaaS hosting, Kubernetes hosting, and elastic efficiency construction.
Alibaba Cloud has been named a Leader in the Gartner® Magic Quadrant™ for Cloud Database Management Systems (DBMS) for the third consecutive year in 2022.
This article explores the correlation of cloud computing technology with the success stories of Onion Academy, Chanjet, and Baifu Travel.
This article highlights a speech from the Alibaba Cloud developer conference that explains how cloud-native makes life convenient for developers.
This article explains the security features Alibaba Cloud ASM offers.
This tutorial describes how you can implement authentication requirements for a web application in ReactJS with JSON Web Token.
This article covers the basics of Remote Code Execution (RCE), a critical security vulnerability that allows attackers to execute arbitrary code on a target system remotely.
This article provides an introduction to penetration testing, a service that simulates full-scale, in-depth attacks to test your system security.
This article introduces the Alibaba Cloud Academy Certification program, covering various areas such as big data, security, and artificial intelligence.
This article explores the concepts of Red Team and Blue Team in cybersecurity, describing their roles and activities in testing and improving an organization's security posture.
This article introduces DNS spoofing, which is a malicious technique used by attackers to manipulate the DNS resolution process and redirect users to fraudulent websites.
This short article gives an overview of Alibaba Cloud Security.
This short article explains the steps to create a secure remote workspace on Alibaba Cloud.
Following (9)See All