High Availability Deployment Architecture

What’s High Availability High availability is a critical success factor for any given enterprise application. Today we’ll go through how to design and deploy an application with high availability. First things first. Let’s see what’s high availability. High availability is a characteristic of a system, which describes the duration (length of time) for which the system is operational. – Wikipedia In simple words high availability…

Read More

SSH Tunnelling – Local Port Forwarding

Introduction Today we are going to experience the power of the SSH(Secure Shell) command. Yes Linux. I recently wrote an article on X11 forwarding that allows to map your local computer’s GUI to server where SSH is used underneath. It’s time for you read it if you haven’t. To understand the today’s topic let’s 1st look at what’s tunnelling that’s the foundation. In wikipedia tunnelling is defined…

Read More

Apache Access Logs to MySQL Database

Apache Access Logs Centralising Apache logs can be useful in many scenarios. Let’s get the basics 1st. So Apache logs can be defined as In order to effectively manage a web server, it is necessary to get feedback about the activity and performance of the server as well as any problems that may be occuring. The Apache HTTP Server provides very comprehensive and flexible logging…

Read More

Web Shell – WSO – Security – #ImAWhiteHat

So WSO!!! By attempting any of the things listed in this blog post you accept full responsibility for your actions and I will not be held responsible whatsoever. This tutorial is strictly for penetration testers only.  Today we are going to talk about a slightly different topic. I’m pretty sure you are going to love it if you are techie like me. This post is…

Read More