Tag: security

  • Secure web application deployment

    In Nov 2020, I created OrthWeb project, a deployment of Orthanc’s server. Orthanc is a DICOM viewer and repo shipped in Docker container. In the…

    Read
  • Certified Kubernetes Administrator (CKA) Exam

    The Certified Kubernetes Administrator (CKA) exam is a hands-on session where you need to follow the instructions to configure the system in a bash terminal…

    Read
  • Public Key Infrastructure (PKI) – Introduction

    A public-key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates…

    Read
  • Virtualization 1 of 4 – Hypervisor

    In broad terms, virtualization of computing resource is about isolation of resources, at different levels. There are five levels of virtualization: In my context I…

    Read
  • NTLM and Kerberos protocols

    This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…

    Read
  • OAuth 2.0 and OIDC 1 of 2

    OAuth 2.0 and OpenID Connect (OIDC 1.0) are different but highly related protocols and they are often confused. When we talk about IAM (identity and…

    Read