Tags: http

train-267266_1920.jpg

network traffic
Learn how to use IPtables to alter how your traffic is manipulated as it arrives at your server.

Redirecting Network Traffic: Part 2

In the previous article, I looked at how to use the clever redir utility to listen out for inbound traffic on a particular port on a host and then forward that traffic onward somewhere else. Here, I’ll briefly describe some other approaches to manipulating traffic that may suit your needs. IPTables...
Read 0 Comments

Everything Is an HTTPS Interface

In the Linux world everything is file, in the Serverless world everything is an HTTPS interface. Serverless applications by their nature are heavily decomposed into a variety of services, such as autonomous functions, object storage, authentication services, document databases, and pub/sub message...
Read 0 Comments

Severe Vulnerabilities Discovered in HTTP/2 Protocol

Four high-profile bugs have been found in the protocol, potentially placing 85 million websites at risk. On Wednesday at Black Hat USA, cybersecurity firm Imperva released new research into a number of high-profile flaws found within the latest version of HTTP, HTTP/2, which underpins the worldwide...
Read 0 Comments

Kubectl vs HTTP API

One of the best things Kubernetes has is its API, however, I’ve seen a few tools that instead of using the HTTP API use a wrapper on kubectl. I tweeted about it and a discussion was created around the differences between kubectl and the HTTP API. One thing that I hope it’s clear it’s that kubectl...
Read 0 Comments
Click Here!