Skip to main content

Posts

Showing posts from 2017

OATH Authentication

OATH Authentication Giving access to sensitive information with the users permission. There are usually 4 parties involved in this process. The User, 'The User'. The Application requesting access to the User's data, 'The Requesting Application'. The Application which has the User's data, 'The User's Data Host'. The Application which can grant access to the User's data, 'The Access App'. (A token is just a piece of unique text which the receiver reads and understands and can identify and grant permission to access some data or resource). There are more than 1 steps involved: 'The Requesting Application' requests access to 'The User's data. 'The Requesting Application's request is sent to 'The Access App'. 'The Access App' asks 'The User' if she wishes to grant permission to 'The Requesting Application'. 'The User' agrees and response is sent to 'The...

Web Security - HTTPS, SSL, TLS and Certificates

Web Security - HTTPS, SSL, TLS and Certificates https://www.instantssl.com/ssl-certificate-products/https.html Why is it needed? Man-In-the-Middle attacks (someone reading the information you send and receive and may even change the message). How is it implemented? SSL or TLS. SSL This is the secure protocol i.e. a bunch of rules that creators of browsers like Chrome and IE follow. Replaced by TLS. Certificates are used to hold the information need for the Browsers to implement the SSL.   HTTPS https://www.howtogeek.com/howto/33949/htg-explains-what-is-encryption-and-how-does-it-work/ http://robertheaton.com/2014/03/27/how-does-https-actually-work/ A secure/encrypted version of HTTP, combination of HTTP and SSL or TLS. Verifies that you are talking directly to the server that you think you are talking to. Ensures that only the server can read what you send it and only you can read what it sends back. Anyone can intercept every single o...

Containers and Docker

Containers and Docker Docker is an app (open source, Docker Inc is a company). Docker and Containers are not the same, Docker provides a more usable way to manage Containers, without Docker it is very difficult but it can be done. Docker is not the only Container management software but it is the most popular. Docker reads Docker files. The Docker files contain instructions on how to run Containers. An Image is the signature of the Container, the Container is the instance/running image. Containers are applications. These applications need somewhere to run, they run in an Operating System provided by the Cloud of your choice e.g. Azure or AWS. Containers can contain any applications and Containers can run other Containers. You can build up complex Containers using other Containers. Containers are lightweight and start up very fast, quicker than VMs as they do not have their own OS. DockerHub is a store where you can get other Containers. Docker Containers are St...