menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cloud News

Cloud News

source image

Dev

2w

read

26

img
dot

Image Credit: Dev

I bought us-east-1.com: A Look at Security, DNS Traffic, and Protecting AWS Users

  • Owning the us-east-1.com domain was to protect AWS users from malicious actors who might misuse it for phishing or other attacks.
  • Owning this domain has provided fascinating insights into DNS queries—many of which are likely unintentional, generated by AWS resources and misconfigured systems.
  • prod-backend-db.cc66xuedqt2t.us-east-1.com is the most frequent DNS request suggesting a significant number of backend systems mistakenly reach out to this domain.
  • Domains like storagegateway.us-east-1.com and s3.us-east-1.com highlight how systems might inadvertently look to this domain for data, increasing the risk of data leakage if the domain were in malicious hands.
  • If someone else owned us-east-1.com, they could potentially set up a fake login portal that mimics the AWS Console, capture sensitive DNS queries that could reveal system configurations or IP addresses, use it as a phishing link to trick users into providing credentials or accessing malware.
  • Check DNS configurations, be mindful of typos and stay vigilant against phishing attacks to prevent sensitive information to unintended locations.
  • Leverage DNS Firewall to filter and regulate outbound DNS queries, preventing data exfiltration and accidental requests to unintended domains.
  • The primary goal is to ensure this domain remains out of the hands of bad actors and serves as a reminder of the simple yet effective ways we can improve cloud security by managing key assets, like domains.
  • Registering us-east-1.com is a simple yet effective step to secure AWS users worldwide.
  • For AWS users and anyone working with cloud services, it is a reminder to double-check configurations, always be wary of URLs, and adopt a proactive approach to security.

Read Full Article

like

1 Like

source image

Dev

2w

read

431

img
dot

Image Credit: Dev

Setting up a shared file storage for the company offices

  • Step 1: Create and configure a storage account for Azure Files.
  • Step 2: Create and configure a file share with directory.
  • Step 3: Configure and test snapshots.
  • Step 4: Configure restricting storage access to selected virtual networks.

Read Full Article

like

25 Likes

source image

Dev

2w

read

278

img
dot

Image Credit: Dev

Analysis of AWS Solutions Architect Professional Certification Question — EC2 Image Builder and Resource Access Manager

  • The article takes a practical approach of analyzing AWS services to better understand complex topics and AWS certifications. It focuses on EC2 Image Builder and AWS Resource Access Manager (RAM). A question is presented and a detailed guide to replicate the exercise is followed.
  • EC2 Image Builder automates the creation and management of system images, such as EC2 AMIs or Docker images, allowing you to define pipelines that build images according to specific components, recipes, tests, and other specifications.
  • RAM is AWS service that enables sharing of resources across accounts within an AWS Organization, you can use RAM to share EC2 Image Builder components, AMIs, subnets, VPCs, and more with other accounts in your organization, or externally.
  • Build components in EC2 Image Builder allow for custom configurations, automating complex configurations, and modularity by allowing the creation of components once and reusing them across multiple recipes or pipelines.
  • Step-by-step instructions are provided to replicate the exercise, which involves creating an image with EC2 Image Builder and sharing it with another account using RAM
  • Resources to share are added and configured with the principals that are permitted to access the shared resources.
  • The article provides detailed screenshots and outputs of the exercise executed in EC2 Image Builder and RAM.
  • The guide concludes with some informative references, including a question from the Whizlabs AWS simulator and official AWS documentation for EC2 Image Builder and RAM.
  • The author provides links to social media and a call to action to give likes and star to the repository.
  • A minimum of 10 lines has been provided in the requested JSON format, purely summarizing the article on EC2 Image Builder and AWS Resource Access Manager.

Read Full Article

like

16 Likes

source image

Tech Radar

2w

read

252

img
dot

Image Credit: Tech Radar

Quordle today – hints and answers for Sunday, October 27 (game #1007)

  • Quordle is one of the original Wordle alternatives and has now exceeded more than 1000 games.
  • The game offers a real challenge, but there are Quordle hints to assist you.
  • The hints below contain 5 vowels, 1 repeated letter, no uncommon letters (Q, Z, X or J), and 2 common starting letters (S and C).
  • Today's Quordle answers are STUNG, CLOUT, SOWER and BASIS.
  • Daily Sequence answers are CHARM, STACK, CREAM, and UNFIT.
  • A summary of the past 20 Quordle games with dates and answers is also part of the article.

Read Full Article

like

15 Likes

source image

Tech Radar

2w

read

204

img
dot

Image Credit: Tech Radar

NYT Strands today — hints, answers and spangram for Sunday, October 27 (game #238)

  • The NYT's latest word game is called Strands, and it's great fun.
  • Today's theme in NYT Strands is 'Best of the best'.
  • The clue words for today's game are FILE, HIDE, REAR, CLASP, PART, and PROP.
  • The spangram for today's game is '__ of the __', and it touches the left side of the board in the 5th row and the right side in the 3rd row.

Read Full Article

like

12 Likes

source image

Dev

2w

read

274

img
dot

Image Credit: Dev

Setting Up a Private Storage account for a Company

  • Step 1: Create a storage account and configure high availability.
  • Step 2: Create a storage container, upload a file, and restrict access to the file.
  • Step 3: Configure storage access tiers and content replication.
  • Step 4: Back up the public website storage.

Read Full Article

like

16 Likes

source image

Digitaltrends

2w

read

82

img
dot

Image Credit: Digitaltrends

GPT-5: everything we know so far about OpenAI’s next frontier model

  • OpenAI is expected to launch its next-gen GPT-5 model soon.
  • The specific release date of GPT-5 is unknown, though it's expected to drastically outperform GPT-4.
  • There are rumors that this new model could arrive in late 2024 although there is debate on whether it will achieve AI.
  • OpenAI has said that its ambitious goal is to achieve Artificial General Intelligence.
  • Mira Murati, the former CTO of OpenAI is confident that the new model was still one and a half years away from release, which would certainly rule out a 2024 timeframe.
  • GPT-5 will bring larger knowledge base, enhanced reasoning skills and improvement in natural language processing and content generation abilities.
  • According to The Verge, the GPT-5 model will be launched this December. But an OpenAI spokesperson denied the statement that the company is not releasing a model code-named Orion this year.
  • The GPT-5 model won't be available in ChatGPT Plus version, at least initially it would reportedly work exclusively with certain partnerships only.
  • There has been significant pushback from the industry and public to development on anything beyond GPT-4.
  • OpenAI aims to allocate at least 20% of its computing resources for safety efforts across the entire company.

Read Full Article

like

4 Likes

source image

Dev

2w

read

135

img
dot

Image Credit: Dev

Creating an Instance on AWS using Ubuntu - AWS Tutorial

  • To create an EC2 instance on AWS using an Ubuntu image, follow these steps:
  • Step 1: Log in to the AWS Management Console
  • Step 2: Navigate to EC2 Dashboard
  • Step 3: Launch an Instance

Read Full Article

like

8 Likes

source image

Guardian

2w

read

61

img
dot

Image Credit: Guardian

‘An existential threat’: anger over UK government plans to allow AI firms to scrape content

  • UK government's plans to allow AI companies to scrape content from publishers and artists is facing anger. The AI policy could lead to tech companies training their AI models using online content unless the content creators opt-out.
  • The proposed AI policy has lead to a series of meetings and roundtables being planned to address concerns.
  • Publishers fear an opt-out approach would be impractical as they may not know when their material is being scraped. Smaller publishers would be at risk if their work is used in training AI models.
  • The BBC said in a statement that its content should not be used to train AI models without authorisation.
  • An opt-in system would give publishers more leverage to agree licensing terms; an opt-out system would give control to AI developers.
  • Chris Dicker of the Independent Publishers Alliance said a system that scrapes anything posted online without explicit consent is a direct threat to privacy.
  • A government spokesperson said this is an area that requires thoughtful engagement; they will set out the next steps at the appropriate time.
  • UK risk being left behind unless it builds more data centres and lets tech firms use copyrighted work in AI models, warns Google.
  • A statement signed by over 10,000 people from the creative industries warns against unlicensed use of their work by AI companies.
  • The row illustrates the fundamental changes taking place after the arrival of AI chatbots; users can receive information without seeing the original publisher's work.

Read Full Article

like

3 Likes

source image

Tech Radar

2w

read

331

img
dot

Image Credit: Tech Radar

Apple has a week of product reveals planned for us - here's everything we expect

  • Apple is set to release M4-powered Macs and MacBook devices.
  • The week of announcements starting on Oct 28, 2024 may see the introduction of M4 MacBook Pro, MacBook Air, iMac and Mac mini.
  • The M4 MacBook Pro models will showcase the major performance improvements over previous M3 Pro models - potentially using 10-core CPU and GPU.
  • Reports suggest that the M4 Mac mini will be redesigned to be the smallest computer made by the company, with 16GB of unified memory which is expected to be highly beneficial to desktop setups.
  • The M4 iMac is also expected to be announced, along with Magic accessories, and we hope it comes with at least 16GB standard memory.
  • M4 MacBook Air is rumored to be the top priority for Apple’s early 2025 release schedule and will reportedly remain the same in terms of its design with the M4 chip being the only major alteration.
  • M4-powered Mac Studio is expected to arrive between March and June 2025.
  • The base models of any new MacBook Pro and iMac are expected to have at least 16GB of unified memory.
  • Apple is keen to announce a new and improved version of its biggest laptop seller, M4 MacBook Air.
  • Macs are shifting towards gaming and recently released Resident Evil 4 remake highlights this.

Read Full Article

like

19 Likes

source image

Digitaltrends

2w

read

314

img
dot

Image Credit: Digitaltrends

It’s finally time to stop buying Nvidia’s RTX 30-series GPUs

  • To get the best bang for your buck, it’s time to stop buying Nvidia’s RTX 30-series and look for other options.
  • The arrival of the RTX 40-series has cast a new light on the predecessor, and it's now mainly overpriced cards or unavailable, so don't waste your money.
  • Nvidia's RTX 40-series is now almost entirely under or at MSRP making it a financially sense choice, given the 30-series have risen in price again.
  • The then-overpriced RTX 3080 Ti came back down to a more reasonable level, but that still doesn’t make it worth the money in the current GPU climate.
  • AMD still has a bunch of solid cards in the RDNA 2 lineup, and many of them are dirt cheap at this point.
  • For Nvidia, your best bet is to buy current-gen GPUs.
  • Apart from buying new graphics cards, you can always look for renewed or used options.
  • We’re on the cusp of the RTX 50-series, and Ampere cards are soon becoming not just last-gen, but last-last-gen.
  • It’s time to bid farewell to a generation that was solid, but many of us never got to try it out for ourselves.
  • While it’s sad to see these cards slowly get replaced, it sure is a relief to see the GPU market overflowing with options.

Read Full Article

like

18 Likes

source image

Dev

2w

read

200

img
dot

Image Credit: Dev

AWS Compute - Part 3: serverless, lambda and fargate

  • Serverless computing allows deployment of workloads without managing EC2 instances, focusing on application differentiation
  • AWS has developed serverless services for all three layers of the application stack
  • With Lambda, you can run code without provisioning or managing servers
  • Lambda runs your code on a high availability compute infrastructure and requires no administration from the user
  • The Lambda function is the foundational principle of AWS Lambda
  • With Fargate, you can use all the same Amazon ECS concepts, APIs, and AWS integrations
  • AWS Fargate is a purpose-built serverless compute engine for containers
  • Fargate supports both Amazon ECS and Amazon EKS architecture and provides workload isolation and improved security by design
  • AWS rounds up duration to the nearest ms with no minimum run time
  • You are charged for the number of times that your code is invoked (requests) and for the time that your code runs, rounded up to the nearest 1 millisecond (ms) of duration

Read Full Article

like

12 Likes

source image

Dev

2w

read

213

img
dot

Image Credit: Dev

Broadcom killed VMware: Was this acquisition good or bad for you?

  • Broadcom's acquisition of VMware has raised concerns and complexities for many stakeholders.
  • Broadcom plans to reduce the number of VMware partners from 28,000 to 1,000, impacting resellers and consultants.
  • Broadcom aims to shift VMware's focus from virtualization to specializing in private clouds and streamline its product offerings.
  • Customers with existing perpetual licenses are being forced to switch to a subscription model, leading to dissatisfaction and potential investigations.

Read Full Article

like

12 Likes

source image

Dev

2w

read

77

img
dot

Image Credit: Dev

My First Week in DevOps: Starting with Linux

  • This week marks the beginning of my journey into the world of DevOps, starting with learning Linux.
  • Linux is essential for DevOps engineers as it is the backbone of server environments and familiarity with the command line is crucial.
  • The initial challenge was getting used to typing commands instead of using a mouse, but daily practice is helping to improve.
  • The first accomplishment was learning to use grep command to search for text in files.

Read Full Article

like

4 Likes

source image

Dev

2w

read

135

img
dot

Image Credit: Dev

AWS Trusted Advisor for Security Checks

  • AWS Trusted Advisor is an online resource that helps AWS customers optimize their cloud infrastructure by providing real-time guidance on best practices.
  • Trusted Advisor provides insights on cost, performance, fault tolerance, and most importantly, security.
  • It offers Security Checks relating to IAM Access Key Rotation, MFA on Root Account, Unrestricted Access to S3 Buckets, Security Groups with Unrestricted Inbound Access, and Service-Specific Recommendations.
  • Benefits of using Trusted Advisor include proactive threat mitigation, streamlined compliance, enhanced visibility, cost-effective security management, and integration with other AWS services.
  • Trusted Advisor is available at no additional cost for AWS Basic Support customers however, advanced security checks would require subscription to Business or Enterprise Support plans.
  • Adopting a proactive approach to security management is crucial in maintaining an organization's cloud security posture.
  • It is recommended to regularly review Trusted Advisor recommendations, prioritize remediation efforts, educate your team, integrate with security operations, and leverage automation for efficient security management.
  • Finally, by leveraging Trusted Advisor for security checks, organizations can keep their cloud infrastructure secure, build trust with their customers, and pave the way for long-term success in the cloud.

Read Full Article

like

8 Likes

For uninterrupted reading, download the app