Skip to content

Instantly share code, notes, and snippets.

@enixdark
enixdark / design-thinking-ux-user-story-mapping.md
Created October 30, 2019 04:32 — forked from michaellihs/design-thinking-ux-user-story-mapping.md
Design Thinking, UX, User Story Mapping...

Concepts

Journey Map

User journey map is a visualization of an individual’s relationships with a product/brand over time and across different channels.

  • commonly it’s represented as a timeline of all touch points between a user and a product
  • timeline contains information about all channels that users use to interact with a product
  • visualizes how a user interacts with a product and allows designers to see a product from a user’s point of view
@enixdark
enixdark / container-security.md
Created October 30, 2019 04:31 — forked from michaellihs/container-security.md
Container Security

Container Security

Overview of Container Security Threats

  • Image Development
    • Installing SW without proper configuration, e.g. default passwords...
    • Exposed credentials in Dockerfiles
  • Malware in 3rd party resources used to build the image
@enixdark
enixdark / iptables-cheatsheet.md
Created September 17, 2019 10:14 — forked from mcastelino/iptables-cheatsheet.md
iptables-cheatsheet

The netfilter hooks in the kernel and where they hook in the packet flow

The figure below calls out

  • The netfilter hooks
  • The order of table traversal
@enixdark
enixdark / iptables-cheatsheet.md
Created September 17, 2019 10:14 — forked from mcastelino/iptables-cheatsheet.md
iptables-cheatsheet

The netfilter hooks in the kernel and where they hook in the packet flow

The figure below calls out

  • The netfilter hooks
  • The order of table traversal
@enixdark
enixdark / iptables-cheatsheet.md
Created September 17, 2019 10:14 — forked from mcastelino/iptables-cheatsheet.md
iptables-cheatsheet

The netfilter hooks in the kernel and where they hook in the packet flow

The figure below calls out

  • The netfilter hooks
  • The order of table traversal
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: mongodb-pv-claim
labels:
app: mongodb
spec:
storageClassName: rook-block
accessModes:
- ReadWriteOnce
@enixdark
enixdark / self-signed-certificate-with-custom-ca.md
Created August 28, 2019 04:48 — forked from fntlnz/self-signed-certificate-with-custom-ca.md
Self Signed Certificate with Custom Root CA

Create Root CA (Done once)

Create Root Key

Attention: this is the key used to sign the certificate requests, anyone holding this can sign certificates on your behalf. So keep it in a safe place!

openssl genrsa -des3 -out rootCA.key 4096
@enixdark
enixdark / 2018-https-localhost.md
Created August 28, 2019 04:12 — forked from cecilemuller/2019-https-localhost.md
How to create an HTTPS certificate for localhost domains

How to create an HTTPS certificate for localhost domains

This focuses on generating the certificates for loading local virtual hosts hosted on your computer, for development only.

Do not use self-signed certificates in production ! For online certificates, use Let's Encrypt instead (tutorial).

@enixdark
enixdark / kerberos_setup.md
Created June 13, 2019 02:46 — forked from ashrithr/kerberos_setup.md
Set up kerberos on Redhat/CentOS 7

Installing Kerberos on Redhat 7

This installation is going to require 2 servers one acts as kerberos KDC server and the other machine is going to be client. Lets assume the FQDN's are (here cw.com is the domain name, make a note of the domain name here):

  • Kerberos KDC Server: kdc.cw.com
  • Kerberos Client: kclient.cw.com

Important: Make sure that both systems have their hostnames properly set and both systems have the hostnames and IP addresses of both systems in