No tags yet.
top of page
Securing ChatOps from the Burger King Bot Hack
New security concerns have been introduced recently with the advent of new human interface device bots like Alexa, OK Google or some of...
Securing ChatOps from the Burger King Bot Hack
New security concerns have been introduced recently with the advent of new human interface device bots like Alexa, OK Google or some of...
You will never sleep after reading this!
One common design pattern I've come across needing frequently is the ability to have dependent starts. Start service1 then start service2...
You will never sleep after reading this!
One common design pattern I've come across needing frequently is the ability to have dependent starts. Start service1 then start service2...
Securely managing a gaggle of SSH Keys
Awhile back, I shared some bash code on how to mange ssh keys. Let's take it a step further and apply some security best practices. Are...
Securely managing a gaggle of SSH Keys
Awhile back, I shared some bash code on how to mange ssh keys. Let's take it a step further and apply some security best practices. Are...
Recruiters quizzing before submitting
I'm a little stunned. Most recruiters just want to hear a verbal that you perform a skill and try to get the highest compensation so they...
Recruiters quizzing before submitting
I'm a little stunned. Most recruiters just want to hear a verbal that you perform a skill and try to get the highest compensation so they...
Resolve the problems before anyone else finds them.
Spend minutes to check around everyday. Don't put 100% trust in your #DevOps code.
Resolve the problems before anyone else finds them.
Spend minutes to check around everyday. Don't put 100% trust in your #DevOps code.
bottom of page