I pulled my hair for 3 hours before solving this. Now here’s the solution so that you don’t have to pull yours. Here’s t...
Conducting academic research is hard. Whether it be searching for articles, reading through tons of papers or maybe writ...
Metrics, Logs and Traces (MLT) are the three pillars of observability that can provide us with complete visibility of a ...
if-elif statements are one of the used features of Python. However, they can become hard to read when the number of elif...
Humans often wrongly discriminate based on skin color, religion and beliefs. Whether this increases or decreases every d...
Metasploit is the ultimate penetration testing tool for offensive security. And it’s so easy to use that even you could ...
Nmap is a CLI based port scanner. As modern networking relies heavily on TCP ports, scanning these ports can expose valu...
In the previous blog post we deployed an nginx container with 3 replicas. Replicas allows us to upscale an application a...
A typical Kubernetes workflow follows the following steps- Write code Containerize app Send to container registry Deploy...