Cost-effective design for highly available and fault tolerant systems using ELB and Auto Scale.
Fears of every database and search field associated with a web application.
Hacking, Metasploit, and a real example of 'hacking' a machine.
Want to keep your search history to yourself? Learn how to make your own little anonymizing proxy!
What is the "dark web"? What is Tor? How does it work? This posts takes a look under the hood of how this anonymizing service works.
My first blog post