Skip to content

Commit

Permalink
Merge pull request #2045 from kailashloginradius/develop
Browse files Browse the repository at this point in the history
Develop
  • Loading branch information
kailashloginradius authored Jan 3, 2025
2 parents eff4a5d + c3d3816 commit 1a39190
Show file tree
Hide file tree
Showing 15 changed files with 18 additions and 20 deletions.
2 changes: 1 addition & 1 deletion content/engineering/a-bot-protection-overview/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@ There are some issues with blacklisting, though. Choosing which targets to black

If you want to save your site from spams and denial-of-service attacks you can incorporate a layer of Proof Of Work algorithm in your site. Whenever any client will try to connect to your server they need to commit some of their resources to the Proof Of Work algorithm first and then the server should be connected.

With this approach, any legitimate user would experience just a negligible computational cost, but a spammer/attacker trying to establish a large number of connections would bear the computational cost and time delay, it deters the abuser to do so. There are many POW algorithms which you can use eg:- [Client Puzzle Protocol](https://en.wikipedia.org/wiki/Client_Puzzle_Protocol), [Productive Puzzle Protocol](https://ieeexplore.ieee.org/document/7509937), [Guided Tour Puzzle Protocol](https://en.wikipedia.org/wiki/Guided_tour_puzzle_protocol)
With this approach, any legitimate user would experience just a negligible computational cost, but a spammer/attacker trying to establish a large number of connections would bear the computational cost and time delay, it deters the abuser to do so. There are many POW algorithms which you can use eg:- [Client Puzzle Protocol](https://en.wikipedia.org/wiki/Client_Puzzle_Protocol), Productive Puzzle Protocol, [Guided Tour Puzzle Protocol](https://en.wikipedia.org/wiki/Guided_tour_puzzle_protocol)

### Other Forms of Malicious Bots:

Expand Down
2 changes: 1 addition & 1 deletion content/engineering/getting-started-phonegap/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ C:\>rootdir\cordova create FirstSite
3. This will create a project in the root folder with the specified site-name. This project will contain:
1. "hooks" directory- Contains special scripts that can be used to customize Cordova commands.
2. "platforms" directory- This contains the app specific projects that you will include below.
3. "plugins" directory- Contains add-on code for interfacing with native features. You can create your own custom interface or use one of [pre-compiled plugins](http://plugins.cordova.io/#/).
3. "plugins" directory- Contains add-on code for interfacing with native features. You can create your own custom interface or use one of pre-compiled plugins.
4. "www" directory- Contains the PhoneGap/Cordova structure and some standard js and css files.
5. config.xml file- This file contains meta data for controlling common features of your apps like the app title, description and author.
4. Add platforms to the project with the _cordova platform add <platform>_ command. **Note:** adding platforms requires that the relevant dependencies are installed in your system for example adding android requires that you have installed the Android SDK. Available platforms for a windows environment are:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -191,7 +191,7 @@ This code is mostly the same as for HTTP/1.1 with two notable differences:

That's it!

If you restart the API and check the network tab in Developer Tools, you'll see that your application will now stream over HTTP/2 (don't forget to update the URL in your webapp, start with "https://" instead of "http://").
If you restart the API and check the network tab in Developer Tools, you'll see that your application will now stream over HTTP/2 (don't forget to update the URL in your webapp, start with `https://` instead of `http://`).

## HTTP Streaming Considerations

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ When managing a remote software engineering team, it is crucial to have an onsit

## 9. Team Feedback Goes a Long Way

When managing a remote software engineering team, it is crucial to actively solicit feedback from the group. This will help build trust and understanding among team members. It can also prevent misunderstandings when regular staff members get back onsite or new hires arrive to understand their role within the [company](https://referralcandy.wpengine.com/blog/company-culture-examples/) and expectations.
When managing a remote software engineering team, it is crucial to actively solicit feedback from the group. This will help build trust and understanding among team members. It can also prevent misunderstandings when regular staff members get back onsite or new hires arrive to understand their role within the company and expectations.

## 10. Building Trust With Remote Team Members

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -300,7 +300,7 @@ You can configure the LoginRadius Auth Page by adding social login methods like

![Added Facebook as an loginmethod](lr_add_social.png "Added Facebook as an loginmethod")

After adding, visit the LoginRadius Auth Page either by visiting [locahost:4200](http://locahost:4200) and log out. Or using the command `lr demo`. You will find the new login method added.
After adding, visit the LoginRadius Auth Page either by visiting `locahost:4200` and log out. Or using the command `lr demo`. You will find the new login method added.

![Added Facebook as an loginmethod](add_login_method.png "Added Facebook as an loginmethod")

Expand Down
2 changes: 1 addition & 1 deletion content/engineering/self-hosted-mongo/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ Now that you know the major why(s) and are still reading this post, without furt
Since the entire content can be a bit exhausting in one place, I’m going to divide this into 2 related posts.

# 1. Setting up the Infrastructure
I’m going to mention below the guide for setting up an instance running **RedHat Enterprise Linux 8** on AWS. This is because MongoDB generally performs better with the xfs file-system. [Here is an article to understand it better.](https://scalegrid.io/blog/xfs-vs-ext4-comparing-mongodb-performance-on-aws-ec2/)
I’m going to mention below the guide for setting up an instance running **RedHat Enterprise Linux 8** on AWS. This is because MongoDB generally performs better with the xfs file-system.

## Spin up an EC2 Instance
I’ve used a `t3.small` instance that comes with **2 vCPUs** and **2Gb of RAM** albeit you can select any instance of your choice.
Expand Down
2 changes: 1 addition & 1 deletion content/engineering/simple-social-media-solutions/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ All you need to do is create a link tag on your page:
```


You can improve upon this by utilizing one of the Social providers branded icons to better display the linking UX. Get a copy of Facebooks Branded Icon [here](https://www.facebookbrand.com/).
You can improve upon this by utilizing one of the Social providers branded icons to better display the linking UX. Get a copy of Facebooks Branded Icon.
You can store the image locally and include it in the a tag:

```js
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -211,7 +211,7 @@ Step 7. Run the project :
```


Step 8. Visit the browser with the URL **[http://127.0.0.1:3000](http://127.0.0.1:3000/)**.
Step 8. Visit the browser with the URL `http://127.0.0.1:3000`.



Expand Down
2 changes: 1 addition & 1 deletion content/engineering/vim-getting-started/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -73,7 +73,7 @@ So to sum up,
![BadVim](BadVim.png)


To get started, get your hands dirty on [**vimtutor**](http://www2.geog.ucl.ac.uk/~plewis/teaching/unix/vimtutor) . It's a 20-30 minute vim tutorial which teaches you all the basics. Just type `vimtutor` in your terminal (in a machine where you have vim installed) to open it.
To get started, get your hands dirty on **vimtutor** . It's a 20-30 minute vim tutorial which teaches you all the basics. Just type `vimtutor` in your terminal (in a machine where you have vim installed) to open it.

**Try [Vim Adventures](https://vim-adventures.com/)**. An interactive game that teaches you vim skills in a step by step manner and lets you unlock new abilities after you've proved your worth with the previous ones.

Expand Down
4 changes: 2 additions & 2 deletions content/growth/tips-and-tricks-b2b-consultant/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ However, boosting your profitability as a business-to-business consultant is no

In order to secure more clients, you need to demonstrate your expertise. They should know what you can do to help them grow. So, you can inspire confidence towards your brand, your prospects ought to know the companies you currently serve and have served in the past successfully.

Apart from the usual client calls and emails, you can conduct speaking engagements that show off your special skills, this can also mean taking part in podcasts. This is one way to position yourself in the industry. You can also produce quality content, which you can disseminate through email, social media, your website or even [create your own online course](https://www.omnicoreagency.com/best-online-course-platforms/). Focus on engaging videos because studies show that [64% of users](https://www.socialmediatoday.com/content/consumers-64-more-likely-purchase-product-after-watching-online-video-infographic) are more likely to buy a product after watching a video.
Apart from the usual client calls and emails, you can conduct speaking engagements that show off your special skills, this can also mean taking part in podcasts. This is one way to position yourself in the industry. You can also produce quality content, which you can disseminate through email, social media, your website or even create your own online course. Focus on engaging videos because studies show that [64% of users](https://www.socialmediatoday.com/content/consumers-64-more-likely-purchase-product-after-watching-online-video-infographic) are more likely to buy a product after watching a video.

Showing materials that resonate with your clients will increase your website traffic. Work hard to ascertain these are fresh, informative, and entertaining. These steps will draw them to your site, which contains a wealth of information on your product offerings, client lists, pricing, reviews, and more. Highlight your successful projects to show off your capabilities. Through amazing content, your prospects can truly understand [your brand and value](https://www.upflip.com/learn/how-to-value-a-business).

Expand Down Expand Up @@ -102,7 +102,7 @@ In contrast, CEOs are all about results and goals. They are visionaries that thi

If you are speaking with someone resistant to pain, focus on cutting costs, minimizing redundancies, and making processes easier. If you are meeting a gain advocate, then you should focus on how your services can help their company grow. When you can use this knowledge to your advantage, you will have more successful meeting outcomes and project proposals.

While [FedEx](https://www.fedex.com/en-us/home.html) is currently available to individual customers, it has been approved and rated as one of the best B2B companies in the world. The company is placed as [the 2nd most trusted B2B company](https://smallbiztrends.com/2018/08/most-trusted-b2b-brands-2018.html) by SageFrog and appears in [Sacunas’ Top 100 B2B brands list.](https://www.chiefmarketer.com/blog/google-ge-lead-list-of-top-100-b2b-brands/) This company hasn’t made to these lists by mistake, this is because it is mostly committed towards customer service, experience, and open communication. Unlike most of its competitors, FedEx has taken into consideration its customers’ pain points and presented itself as a customer-centric company.
While [FedEx](https://www.fedex.com/en-us/home.html) is currently available to individual customers, it has been approved and rated as one of the best B2B companies in the world. The company is placed as [the 2nd most trusted B2B company](https://smallbiztrends.com/2018/08/most-trusted-b2b-brands-2018.html) by SageFrog and appears in Sacunas’ Top 100 B2B brands list. This company hasn’t made to these lists by mistake, this is because it is mostly committed towards customer service, experience, and open communication. Unlike most of its competitors, FedEx has taken into consideration its customers’ pain points and presented itself as a customer-centric company.

![tips-b2b](tips-b2b.png)

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,9 +26,7 @@ The best security questions and answers make it easy for legitimate consumers to
* If the answer has birthdays, it can be easy for an attacker to find online.
* If the question and answer have a school name or location too, such information is easily available for attackers.

You can minimize both of these outcomes by creating good security questions. \
\
_According to the Good Security Questions_ _[website](https://goodsecurityquestions.com/), answers to a good security question should meet these criteria:_
You can minimize both of these outcomes by creating good security questions.

1. **Safe**: Cannot be guessed or researched.
2. **Stable**: Does not change over time.
Expand Down
2 changes: 1 addition & 1 deletion content/identity/cybersec-roundup-june-2021/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -80,7 +80,7 @@ In June, [JBS confirmed](https://www.bbc.com/news/world-us-canada-57318965) that

### 6. NYC Law Department’s Large-Scale Lockout

The [New York City Law Department](https://www.wsj.com/articles/new-york-city-law-department-hit-by-cyberattack-11623105336) was hacked, leaving thousands of its lawyers locked out of their accounts.
The New York City Law Department was hacked, leaving thousands of its lawyers locked out of their accounts.

It turned out that a hacker got into the network of the 1,000-lawyer agency by using a worker's email password. The invasions caused havoc with the city's lawyers, halted court procedures, and threw the department's legal affairs into turmoil. Most expressed concerns about the exposure of Social Security numbers and other sensitive data.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ The dust is still settling. With compromised credentials remaining a key compone

- **Phishing attacks**: [Phishing attacks](https://www.loginradius.com/blog/phishing-for-identity/) are getting more and more sophisticated. Nowadays, because employees have grown to become more aware of hackers' phishing tactics, the latter has up their game. For example, cybercriminals are leveraging AI and machine language to deliver believable false messages in the expectation that recipients will unintentionally breach their organizations’ networks, systems, and corporate databases. 
- **Electronic Medical Records**: With hospitals and medical facilities digitalizing patient records, Electronic Medical Records or EMRs are fast becoming the next big target for cybercriminals. Hackers are exploiting the multiple flaws in their security defenses. And now that the medical records of patients are almost all public, EMRs are gradually turning into breeding grounds for hackers, due to the confidentiality of the records they hold. 
- **Cloud vulnerability**: Due to the versatility & costs associated with the legacy data center, businesses are rapidly shifting their confidential data from legacy data centers to the cloud. According to a [prediction by Forbes.com](https://www.logicmonitor.com/resource/the-future-of-the-cloud-a-cloud-influencers-survey/?utm_medium=pr&utm_source=businesswire&utm_campaign=cloudsurvey), 83% of enterprises' workload will be on the cloud by 2020. But then, it will be creating new challenges and worsening the existing ones for businesses. Among the top cloud security vulnerabilities in this row include account hijacking, DDoS attacks, data breach insecure interfaces and APIs, malicious insider threats, and misconfiguration. 
- **Cloud vulnerability**: Due to the versatility & costs associated with the legacy data center, businesses are rapidly shifting their confidential data from legacy data centers to the cloud. According to a prediction by `Forbes.com`, 83% of enterprises' workload will be on the cloud by 2020. But then, it will be creating new challenges and worsening the existing ones for businesses. Among the top cloud security vulnerabilities in this row include account hijacking, DDoS attacks, data breach insecure interfaces and APIs, malicious insider threats, and misconfiguration. 
- **BYOD-related challenges**: Bring Your Own Device or BYOD turns out to be carrying its own set of advantages and [cybersecurity challenges](https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/) for enterprises. On the one hand, businesses enjoy a great deal of cost-cutting by letting employees work on their own devices. But on the other, it has been increasing the strain on security systems. Numerous data leaks and malware infections are already detected. It has turned out to be much harder to track and manage different types of devices.
- **Internet Of Things (IoT)**: With the adoption of IoT, companies are becoming more dependent on interconnected technology. As a result, attackers are exploiting the vulnerabilities in the IoT infrastructure. Security threats like DDoS and ransomware are becoming a common occurrence. 

Expand Down
2 changes: 1 addition & 1 deletion content/identity/identity-management-healthcare/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ First, though, we need to discuss what makes the control of healthcare identitie

Simply put, the more data compromised, the more it leads to regulatory penalties, loss of patient trust, and bad publicity. 

- According to the [2020 Breach Barometer](https://blog.protenus.com/2020-breach-barometer-41m-patient-records-breached-as-hacking-incidents-escalate) published by Protenus, more than 41 million patient records were breached in 2019.  
- According to the 2020 Breach Barometer published by Protenus, more than 41 million patient records were breached in 2019.  
- 59 percent of the respondents surveyed in Europe and the U.S. were [concerned about their medical data](https://www.rsa.com/content/dam/en/e-book/rsa-data-privacy-report.pdf) security, while 39% were worried that hackers would play foul with their digital data. 

So, why are information networks for healthcare a priority for hackers? 
Expand Down
6 changes: 3 additions & 3 deletions src/components/header.js
Original file line number Diff line number Diff line change
Expand Up @@ -270,7 +270,7 @@ const Header = ({ searchIndex, pathname, type }) => {
</ul>
<div className={headerStyles.logos}>
<a href="">
<img src="https://www.loginradius.com/wp-content/themes/login-radius/images/v5-megamenu/logos-developers.svg" />
<img src="https://www.loginradius.com/wp-content/themes/login-radius/images/v5-megamenu/logos-developers.svg" alt="Cloud Provider Logos" />
</a>
</div>
</div>
Expand Down Expand Up @@ -494,10 +494,10 @@ const Header = ({ searchIndex, pathname, type }) => {
</h4>
<div>
<a href="https://www.loginradius.com/customers">
<img src="https://www.loginradius.com/wp-content/themes/login-radius/images/v5-megamenu/customer-logos-1.png" />
<img src="https://www.loginradius.com/wp-content/themes/login-radius/images/v5-megamenu/customer-logos-1.png" alt="Customers Logos 1" />
</a>
<a href="https://www.loginradius.com/customers">
<img src="https://www.loginradius.com/wp-content/themes/login-radius/images/v5-megamenu/customer-logos-2.png" />
<img src="https://www.loginradius.com/wp-content/themes/login-radius/images/v5-megamenu/customer-logos-2.png" alt="Customers Logos 2" />
</a>
</div>
</div>
Expand Down

0 comments on commit 1a39190

Please sign in to comment.