Author Archive

Workshop – Designing Highly Available Websites/Apps with AWS

Do you have enough knowledge to leverage AWS services to provide High Availability to your Website or Application? Are you a Cloud computing savvy person?   Intro   This Workshop is to provide enough information to make you start thinking in Cloud, know the differences between Traditional and Cloud Computing, how to design your Architecture… [read more]

Read More…

Working with Amazon AWS EC2: Ephemeral disks

Ever wondered how useful instance storage (ephemeral disk) could be?   As shown in the previously article, we start to see things differently while working with Cloud Computing, therefore apart from the EBS disks we discussed earlier on we will now be focusing in instance storage – well-known as ephemeral disk. Starting from instances ‘m1.small’… [read more]

Read More…

Working with Amazon AWS EC2: Resizing disks

Have you ever thought how easy would be to resize a disk in a Cloud environment? Now, imagine with Amazon AWS… much easier though   Starting a new article series called “Working with Amazon AWS” after thinking a lot if this would be public or private classes maybe, I’ve decided to make it public through… [read more]

Read More…

Troubleshooting SSH connectivity issues

Have you ever got stuck troubleshooting why your SSH connection is dropping, sometimes freezes every time you run some commands like top? Check out this quick article. When working with Cloud environments you find yourself connected with 1 or sometimes 2, 3 VPNs to get a simple shell, and when you are there you may… [read more]

Read More…

Quick troubleshooting network bottleneck on Windows

Have you ever looked for a tool similar to iftop to Windows? Where you could quickly see where the network bottleneck or even a malware is coming from/to?   We have a wide range of softwares for troubleshooting in Linux ie built-in or not,  however when it comes to Windows environment you can mostly find… [read more]

Read More…

MySQL PAM and Active Directory authentication

How-To configure your MySQL to use PAM and/or Active Directory authentication with percona-pam-authentication plugin. Continuing articles about Two-Factor authentication or integrating Linux services with Active Directory, this How-To is one of my recent works that I have done these days, so I hope it may help the community with this guide to configure MySQL with PAM and subsequently using Active… [read more]

Read More…

SFTP Jail (chroot) with Active Directory authentication

Another How-To secure SFTP using chroot with AD authentication restricting by Group. You may find loads of articles how to do a SFTP using SSH as well as a Jail, however only few websites provide a How To authenticate against an existent Active Directory. Moreover, you may find hard using winbind to join your Linux… [read more]

Read More…

Two-Factor authentication – Amazon AWS

Have you ever thought that Google Authentication could also be used with Amazon AWS? Here’s how to configure Google Authenticator with Amazon IAM.   Doing some experiments with Google Authenticator I also found that can be used with Amazon AWS, which can bring an additional security to all employees that need access to your Cloud. So,… [read more]

Read More…

Virtual machine images for Virtualbox and VMware

Looking for Virtual machine images for Virtualbox and/or VMware? That quick tip is for you then.   Sometimes you need to build a dev environment or even a quick one for learning purposes. However, you are always in a hurry and can’t spend time installing a new Linux distribution or configuring basic settings in a… [read more]

Read More…

Site-to-site VPN pfSense and Amazon VPC

How to create a Site-to-site VPN between pfSense and Amazon VPC using Virtual Private Gateway feature.   From here, I presume that you already know what is pfSense and Amazon VPC, however instead of creating an instance in Amazon and use an IPsec software, we will be using here a VPN Gateway in Amazon that… [read more]

Read More…