Hi there 馃憢

I write about esoteric computer science topics that you’d love. - Writer, Hacker, Author, Programmer.

3 Tips For Making a Popular Open Source Project in 2021 [Ultimate Guide]

Introduction I have around ~10k GitHub stars. I鈥檝e come up with a bullet-pointed actionable list of how to make open-source projects popular. One of the projects I created had 67 lines of code and had only existed for 3 days before it hit 1.7k stars. Humans are predictable creatures when it comes to our attention. I鈥檒l show you data-backed actionable insights that can help you create popular software. Why Bother? Popular Projects = More Contributors = Better Project What鈥檚 the point in getting more GitHub stars?...

December 17, 2020 路 19 min 路 Bee

Management Fundamentals for AWS

AWS Config One of the largest headaches we have is understanding: What resources do we have? Do we have resources that are no longer needed? Their status, security vulns. How are they linked? What changes have occurred on a resource? Is the infrastructure compliant with governance controls? Accurate auditing information? AWS Config records and captures source changes allowing us to perform actions against the data. It can: Capture resource changes Act as a resource inventory....

December 3, 2020 路 4 min 路 Bee

AWS Cost Management and Customer Support

There are 4 main support plans:: Access online resources (basic) General guidance from AWS (Developer) 24-hour technical support (Business) Dedicated Account Managers and Personaliiseid Consultation Total Cost of Ownership The Total Cost of Ownership (ToC) calculator is a free calculator to compare AWS cloud and on-premise costs. It鈥檚 designed for anyone who is considering migrating to AWS. It creates a report after we complete a short questionaire. The report will include estimated on-premise costs such as:...

December 2, 2020 路 2 min 路 Bee

Overview of AWS Authentication, Authorisation, and Access Control

Authentication Comprised of 2 parts of information. Who you are? Presenting your identity (login username). Unique value within the system we are trying to authenticate to. Verify you are who you say you are. Passwords, MFA, etc. This does not have to be unique. We may use credit card pin numbers for authentication. Identity = credit card, verify = pin number. Authorisation Happens before authentication. System in which we have authenticated to establishes what level of privileges we can access....

December 2, 2020 路 1 min 路 Bee

Overview of Azure Services

Compute Azure Virtual Machines Azure App Service Azure Container Instance Azure Functions Storage Blob Storage Azure File Storage Azure Data Lake Storage Gen2 Relational Databases Azure Synapse Analytics NoSQL Netowkring Virtual Network (VNet) Subnets VVNet peering Azure VPN ExpressRoute Miigration Azure Migrates Azure Active Directory DevOps Azure DevOps Azure Pipelines Azure DevTest Labs Azure CDN IoT Azure IoT Central Azure IoT Hub Azure Sphere Analytics Azure HDInsight Azure Databricks Azure Synapse Analytics AI Cognitive Services Azure Bot Service Azure Machine Learning Studio Machine Learning Services Integration Logic Apps Event Grid Compute Azure Virtual Machines Runs VMs for Windows & Linux....

December 2, 2020 路 3 min 路 Bee

Overview of Azure Storage

Blob storage Binary Large Object (Blob) storage is a way of storing large files. There are 3 types of Blobs in Azure: Blob Blocks Divided into blocks of up to 100MB in size. Blobs of up to 4.75TB can be stored as blob blocks in Azure. Using multiple blocks to represent the blob allows for more efficient handling of large blobs. Usually, the complexity of managing individual blocks is handled for you so you can simply deal with the entire blob rather than individual blocks....

December 2, 2020 路 6 min 路 Bee

Azure Pricing & Support

In order to use Azure, we need an Azure subscription. Azure Subscriptions are linked to accounts that created the subscription. There are 3 main types of subscriptions: Free Unlimited access with 拢200 credit as as trial. Pay as you go Pay for the services and resources that we use on a monthly basis. Member Benefits Like MDN subscribers. Substantial discounts over pay as you go subscription. The person who creates the Azure subscription becomes the global administrator for that subscription....

December 2, 2020 路 2 min 路 Bee

Peer 2 Peer Networks

https://tryhackme.com/room/bruteit Preface If you鈥檙e reading this, like me, you must strangely like the idea of effectively designing peer to peer networks. Almost no real world usage (unless you work in this industry), but nevertheless the design is so interesting! Peer to peer networks effectively are close approximations of how humans interact. Much like how object orientated tried to represent how humans think, I believe peer to peer networks are how humans communicate....

December 2, 2020 路 65 min 路 Bee

Can Artificial Intelligence ever replace penetration testers?

Machine Learning Supervised Learning Unsupervised Learning Reinforcement Learning AlphaGo Learning from the greats Teaching itself Creativity Applications in InfoSec 1. Learning from others 2. Learning from itself Blue Team Humans vs AI Conclusion In this blog post we鈥檒l explore if machines can fully replace pe Something to note is that predicting the future is hard and this is all entirely my opinion....

December 1, 2020 路 10 min 路 Bee

Learn Functional Python in 10 Minutes

In this short 10 minute article, you鈥檒l learn what the functional paradigm is in Python. You鈥檒l also learn about list comprehensions. 馃搶 Functional Paradigm In an imperative paradigm, we do things by giving the computer a sequence of tasks and then it executes them. While executing them, it can change states. For example, let鈥檚 say we set A = 5, then we change the value of A. We have variables in the sense that the value inside the variable varies....

November 30, 2020 路 14 min 路 Bee