Application Deployment Checklist (Linux Systems)

application deployment

Viewer RatingYou must sign in to vote Application Deployment Checklist (Linux Systems) Security of software applications is an important aspect which is often underestimated or ignored at the peril of malicious cyber attacks. The following list is a quick check-list of validations and/or actions to be performed before deploying any enterprise-grade application in Production: 1. … Read more

Top 10 ways to secure your website from hackers and spammers

Viewer RatingYou must sign in to voteIn today’s world, a website is an essential and, sometimes, the most important component of any business, organization, community or group. Websites range from small sites owned by individuals to large enterprise domains and e-commerce platforms dealing with sensitive customer and commercial data. Whatever be the size of a … Read more

Firewall Security

Viewer RatingYou must sign in to voteA firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet. Firewalls are often categorized as either network firewalls or … Read more