BLOG

ITRP19 Note Guide Flameshot: Powerful Screenshot Tool

Introduction   In today’s digital age, capturing and sharing information is a fundamental part of our daily lives. Whether you’re a student, professional, or simply someone who loves to document their experiences, having a reliable screenshot tool can greatly enhance your productivity.  If you’re a Windows, Apple, or Linux user, one tool that stands out […]

Using AWS To Reach Your Compliance Goals

Introduction   In this blog post, we’ll talk about tools that can help you meet your compliance goals. AWS and customers share security and compliance. AWS runs, administers, and controls the host operating system, virtualization layer, and physical security of the service’s facilities, relieving the customer’s operational load. The customer manages the guest operating system, […]

AWS Simple Storage Service (S3) ITRP19’s Guide

Introduction S3 is an object storage service that provides the highest levels of scalability, data availability, security, and performance in the industry. Customers of all sizes and sectors may store and secure an unlimited quantity of data for nearly any use case, including data lakes, cloud-native applications, and mobile devices.  With cost-effective storage classes and […]

2023 Top 10 Vulnerabilities for AWS

Introduction In this blog post, we will discuss the top ten vulnerabilities affecting AWS in the year 2023.   Cloud services, just like any other form of IT service or product, need to be managed properly in order to meet particular reliability and availability requirements. This includes making sure the network is available, making preparations […]

What’s XSS? How Can You Stop it?

Introduction What’s XSS? How can you stop it? As the complexity and usage of web applications increase, so do web application vulnerabilities. Cross-Site Scripting (XSS) vulnerabilities are among the most prevalent forms of online application vulnerabilities. XSS vulnerabilities exploit a flaw in user input sanitization to “write” JavaScript code to the page and execute it […]

How to Identify and Exploit SQL Injection Vulnerabilities

Preface Welcome to the realm of SQL injection vulnerabilities, a journey marked with technical acuity and not a playground for the uninitiated. Be forewarned, this serves as an enlightening resource, not a charter for unethical activity. Before setting sail into the intricacies of exploits, let’s embark on understanding some fundamental terminologies and structures related to […]