Skip to content

Commit

Permalink
updated docs
Browse files Browse the repository at this point in the history
  • Loading branch information
deepaksood619 committed Feb 20, 2024
1 parent bcec1c0 commit 4bf696f
Show file tree
Hide file tree
Showing 11 changed files with 143 additions and 108 deletions.
6 changes: 6 additions & 0 deletions docs/cloud/aws/developer-tools/intro.md
Original file line number Diff line number Diff line change
Expand Up @@ -87,3 +87,9 @@ https://aws.amazon.com/codeguru
AWS Chatbot is an interactive agent that makes it easy to monitor and interact with your AWS resources in your [Slack](https://slack.com/) channels and [Amazon Chime](https://aws.amazon.com/chime/) chat rooms. With AWS Chatbot you can receive alerts and run commands to return diagnostic information, invoke AWS Lambda functions, and create AWS support cases so that your team can collaborate and respond to events faster.

https://aws.amazon.com/chatbot

## Amazon CodeCatalyst

Amazon CodeCatalyst is a unified software development service for development teams to quickly build, deliver and scale applications on AWS while adhering to organization-specific best practices. Developers can automate development tasks and innovate faster with generative AI capabilities, and spend less time setting up project tools, managing CI/CD pipelines, provisioning and configuring various development environments or coordinating with team members. IT Leaders can codify organizational best practices at scale via application blueprints to ensure compliance across teams with scale.

[Amazon CodeCatalyst](https://aws.amazon.com/codecatalyst/)
1 change: 1 addition & 0 deletions docs/computer-science/security/ethical-hacking.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
# Ethical Hacking

- https://www.shodan.io/host/182.71.91.174
- [jenkins - Shodan Search](https://www.shodan.io/search?query=jenkins)
- https://github.com/arthaud/git-dumper/blob/master/git-dumper.py
- https://securitytrails.com/domain/example.com/history/a
- https://www.youtube.com/watch?v=3Kq1MIfTWCE
Expand Down
5 changes: 5 additions & 0 deletions docs/courses/aws-certified-data-engineer-associate.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# AWS Certified Data Engineer - Associate

[AWS Certified Data Engineer - Associate](https://aws.amazon.com/certification/certified-data-engineer-associate/)

Date - Feb 2024
1 change: 1 addition & 0 deletions docs/courses/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,6 +57,7 @@
25. [Self Driving Nanodegree](courses/self-driving-nanodegree.md)
26. [Architecting on AWS (Hands on training)](cloud/aws/course-architecting-on-aws.md) (12-14 Aug 2020)
27. [AWS Certified Developer - Associate (Jan 2024)](courses/aws-certified-developer-associate.md)
28. [AWS Certified Data Engineer - Associate (Feb 2024)](courses/aws-certified-data-engineer-associate.md)

## Certifications

Expand Down
2 changes: 1 addition & 1 deletion docs/management/jobs/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ In early career, taking bets vs random job hopping is critical
- [Platform for Showcasing Work](https://athenasquare.org/)
- [Austin Belcak on LinkedIn: 7 Offer-Winning Job Search Tools: | 70 comments](https://www.linkedin.com/posts/abelcak_7-offer-winning-job-search-tools-activity-7039234808589250561--U2q)
- https://www.pallet.com
- [The Biggest Web3, Crypto & Blockchain Recruitment Agency | Plexus](https://www.plexusrs.com/)
- [**The Biggest Web3, Crypto & Blockchain Recruitment Agency | Plexus**](https://www.plexusrs.com/)

### Remote Job Sites

Expand Down
1 change: 1 addition & 0 deletions docs/networking/others/readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@

- [Falcor](falcor)
- [VPN](vpn)
- [VPN Tools](networking/others/vpn-tools.md)
- [5G Wireless Networking](5g-wireless-networking)
- [Serialization / Deserialization](serialization-deserialization)
- [Comparisions](networking/others/comparisons.md)
Expand Down
103 changes: 103 additions & 0 deletions docs/networking/others/vpn-tools.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,103 @@
# VPN Tools

## Openvpn

OpenVPN is a [free and open-source](https://en.wikipedia.org/wiki/Free_and_open-source) software application that implements [virtual private network](https://en.wikipedia.org/wiki/Virtual_private_network)(VPN) techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocolthat utilizes [SSL/TLS](https://en.wikipedia.org/wiki/Transport_Layer_Security) for key exchange. It is capable of traversing [network address translators](https://en.wikipedia.org/wiki/Network_address_translator)(NATs) and [firewalls](https://en.wikipedia.org/wiki/Firewall_(computing))

OpenVPN allows [peers](https://en.wikipedia.org/wiki/Peer-to-peer) to [authenticate](https://en.wikipedia.org/wiki/Authentication) each other using [pre-shared secret keys](https://en.wikipedia.org/wiki/Pre-shared_key), [certificates](https://en.wikipedia.org/wiki/Public_key_certificate) or [username](https://en.wikipedia.org/wiki/User_(computing))/[password](https://en.wikipedia.org/wiki/Password). When used in a multiclient-server configuration, it allows the server to release an [authentication certificate](https://en.wikipedia.org/wiki/Public_key_certificate) for every client, using [signatures](https://en.wikipedia.org/wiki/Digital_signature) and [certificate authority](https://en.wikipedia.org/wiki/Certificate_authority). It uses the [OpenSSL](https://en.wikipedia.org/wiki/OpenSSL) encryption [library](https://en.wikipedia.org/wiki/Library_(computing)) extensively, as well as the [TLS](https://en.wikipedia.org/wiki/Transport_Layer_Security) protocol, and contains many security and control features.

https://en.wikipedia.org/wiki/OpenVPN

https://openvpn.net

https://medium.com/swlh/creating-a-vpn-with-2-factor-authentication-using-openvpn-and-docker-9569e609151a

## WireGuard

WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.

https://www.wireguard.com

https://www.freecodecamp.org/news/how-to-set-up-a-vpn-server-at-home

## NGrok

ngrok is a reverse proxy that creates a secure tunnel from a public endpoint to a locally running web service. ngrok captures and analyzes all traffic over the tunnel for later inspection and replay.

Unified Ingress Platform 
for developers

ngrok combines your reverse proxy, firewall, API gateway, and global load balancing to deliver apps and APIs.

https://ngrok.com

https://github.com/inconshreveable/ngrok

## Secure access service edge (SASE) model

https://pages.awscloud.com/AWSMP-SEC-NetworkSecurity-Edge-SASE-en.html

## Cloudflare Zero Trust

Cloudflare Zero Trust replaces legacy security perimeters with our global network, making the Internet faster and safer for teams around the world.

### Zero Trust access for all of your applications

- Authenticate users on our global network
- Onboard third-party users seamlessly
- Log every event and request

### A Secure Web Gateway to protect users and devices

- Enforce your company’s Acceptable Use Policy (AUP)
- Block risky sites with custom blocklists and built-in threat intel
- Enhance visibility and protection into SaaS applications

### A fast and reliable solution for remote browsing

- Execute all browser code in the cloud
- Mitigate the impact of attacks
- Seamless, lightning-fast end user experience

### A Cloud Access Security Broker to safeguard data in the cloud

- Protect users and sensitive data at rest in SaaS applications
- Detect insider threats and unsanctioned application usage, or Shadow IT
- Ensure best practices to prevent data leaks and compliance violations

### A Data Loss Prevention (DLP) solution to safeguard data in transit

- Detect sensitive data as it moves to and from SaaS applications
- Predefined DLP Profiles to quickly get started
- Log or block DLP matches

[Cloudflare Zero Trust · Cloudflare Zero Trust docs](https://developers.cloudflare.com/cloudflare-one/)

[WARP | 1.1.1.1 - The free app that makes your Internet faster.](https://1.1.1.1/)

## Pritunl

Enterprise Distributed OpenVPN, IPsec and WireGuard Server

Virtualize your private networks across datacenters and provide simple remote access in minutes

Create a cloud vpn with complex site-to-site links, gateway links and provide local network access to remote users. Protect your network traffic and remote users connecting over public connections with secure encryption. All from a simple web interface

### The Most Secure VPN Server

Pritunl provides innovative security features not available from any other provider. Including TPM and Apple Secure Enclave device authentication, a dynamic firewall, SELinux policies, dual web server design and self shutdown notification system

[GitHub - pritunl/pritunl: Enterprise VPN server](https://github.com/pritunl/pritunl)

[Pritunl - Open Source Enterprise Distributed OpenVPN, IPsec and WireGuard Server](https://pritunl.com/)

## Teleport

DevOps teams use Teleport to access SSH and Windows servers, Kubernetes, databases, AWS Console, and web applications. Teleport prevents phishing by moving away from static credentials towards ephemeral certificates backed by biometrics and hardware identity, and stops attacker pivots with the Zero Trust design.

[Teleport: Identity-Native Infrastructure Access. Faster. More Secure.](https://goteleport.com/)

### Alternative - StrongDM

[StrongDM](https://strongdm.com/) is a Dynamic Access Management ([DAM](https://www.strongdm.com/dynamic-access-management-dam)) platform that extends Privileged Access Management ([PAM](https://www.strongdm.com/privileged-access-management)) to work across any environment on-premises and in the cloud. It is designed to make access [least-privilege](https://www.strongdm.com/blog/principle-of-least-privilege) by default with role-based, attribute-based, and just-in-time access controls. Companies like Humana, SentinelOne, and more have adopted StrongDM to secure access management to all their critical infrastructure.

[Competitors & Alternatives to Teleport 2024 | StrongDM](https://www.strongdm.com/blog/alternatives-to-gravitational-teleport)
113 changes: 12 additions & 101 deletions docs/networking/others/vpn.md
Original file line number Diff line number Diff line change
Expand Up @@ -65,104 +65,15 @@ The IPsec protocols AH and ESP can be implemented in a host-to-host transport mo

https://en.wikipedia.org/wiki/IPsec

## Openvpn

OpenVPN is a [free and open-source](https://en.wikipedia.org/wiki/Free_and_open-source) software application that implements [virtual private network](https://en.wikipedia.org/wiki/Virtual_private_network)(VPN) techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocolthat utilizes [SSL/TLS](https://en.wikipedia.org/wiki/Transport_Layer_Security) for key exchange. It is capable of traversing [network address translators](https://en.wikipedia.org/wiki/Network_address_translator)(NATs) and [firewalls](https://en.wikipedia.org/wiki/Firewall_(computing))

OpenVPN allows [peers](https://en.wikipedia.org/wiki/Peer-to-peer) to [authenticate](https://en.wikipedia.org/wiki/Authentication) each other using [pre-shared secret keys](https://en.wikipedia.org/wiki/Pre-shared_key), [certificates](https://en.wikipedia.org/wiki/Public_key_certificate) or [username](https://en.wikipedia.org/wiki/User_(computing))/[password](https://en.wikipedia.org/wiki/Password). When used in a multiclient-server configuration, it allows the server to release an [authentication certificate](https://en.wikipedia.org/wiki/Public_key_certificate) for every client, using [signatures](https://en.wikipedia.org/wiki/Digital_signature) and [certificate authority](https://en.wikipedia.org/wiki/Certificate_authority). It uses the [OpenSSL](https://en.wikipedia.org/wiki/OpenSSL) encryption [library](https://en.wikipedia.org/wiki/Library_(computing)) extensively, as well as the [TLS](https://en.wikipedia.org/wiki/Transport_Layer_Security) protocol, and contains many security and control features.

https://en.wikipedia.org/wiki/OpenVPN

https://openvpn.net

https://medium.com/swlh/creating-a-vpn-with-2-factor-authentication-using-openvpn-and-docker-9569e609151a

## WireGuard

WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.

https://www.wireguard.com

https://www.freecodecamp.org/news/how-to-set-up-a-vpn-server-at-home

## NGrok

ngrok is a reverse proxy that creates a secure tunnel from a public endpoint to a locally running web service. ngrok captures and analyzes all traffic over the tunnel for later inspection and replay.

Unified Ingress Platform 
for developers

ngrok combines your reverse proxy, firewall, API gateway, and global load balancing to deliver apps and APIs.

https://ngrok.com

https://github.com/inconshreveable/ngrok

## Secure access service edge (SASE) model

https://pages.awscloud.com/AWSMP-SEC-NetworkSecurity-Edge-SASE-en.html

## Cloudflare Zero Trust

Cloudflare Zero Trust replaces legacy security perimeters with our global network, making the Internet faster and safer for teams around the world.

### Zero Trust access for all of your applications

- Authenticate users on our global network
- Onboard third-party users seamlessly
- Log every event and request

### A Secure Web Gateway to protect users and devices

- Enforce your company’s Acceptable Use Policy (AUP)
- Block risky sites with custom blocklists and built-in threat intel
- Enhance visibility and protection into SaaS applications

### A fast and reliable solution for remote browsing

- Execute all browser code in the cloud
- Mitigate the impact of attacks
- Seamless, lightning-fast end user experience

### A Cloud Access Security Broker to safeguard data in the cloud

- Protect users and sensitive data at rest in SaaS applications
- Detect insider threats and unsanctioned application usage, or Shadow IT
- Ensure best practices to prevent data leaks and compliance violations

### A Data Loss Prevention (DLP) solution to safeguard data in transit

- Detect sensitive data as it moves to and from SaaS applications
- Predefined DLP Profiles to quickly get started
- Log or block DLP matches

[Cloudflare Zero Trust · Cloudflare Zero Trust docs](https://developers.cloudflare.com/cloudflare-one/)

[WARP | 1.1.1.1 - The free app that makes your Internet faster.](https://1.1.1.1/)

## Pritunl

Enterprise Distributed OpenVPN, IPsec and WireGuard Server

Virtualize your private networks across datacenters and provide simple remote access in minutes

Create a cloud vpn with complex site-to-site links, gateway links and provide local network access to remote users. Protect your network traffic and remote users connecting over public connections with secure encryption. All from a simple web interface

### The Most Secure VPN Server

Pritunl provides innovative security features not available from any other provider. Including TPM and Apple Secure Enclave device authentication, a dynamic firewall, SELinux policies, dual web server design and self shutdown notification system

[GitHub - pritunl/pritunl: Enterprise VPN server](https://github.com/pritunl/pritunl)

[Pritunl - Open Source Enterprise Distributed OpenVPN, IPsec and WireGuard Server](https://pritunl.com/)

## Teleport

DevOps teams use Teleport to access SSH and Windows servers, Kubernetes, databases, AWS Console, and web applications. Teleport prevents phishing by moving away from static credentials towards ephemeral certificates backed by biometrics and hardware identity, and stops attacker pivots with the Zero Trust design.

[Teleport: Identity-Native Infrastructure Access. Faster. More Secure.](https://goteleport.com/)

### Alternative - StrongDM

[StrongDM](https://strongdm.com/) is a Dynamic Access Management ([DAM](https://www.strongdm.com/dynamic-access-management-dam)) platform that extends Privileged Access Management ([PAM](https://www.strongdm.com/privileged-access-management)) to work across any environment on-premises and in the cloud. It is designed to make access [least-privilege](https://www.strongdm.com/blog/principle-of-least-privilege) by default with role-based, attribute-based, and just-in-time access controls. Companies like Humana, SentinelOne, and more have adopted StrongDM to secure access management to all their critical infrastructure.

[Competitors & Alternatives to Teleport 2024 | StrongDM](https://www.strongdm.com/blog/alternatives-to-gravitational-teleport)
## Types of VPN

|**Types**|**Description**|
|---|---|
|**Remote Access VPN**|Remote Access VPN permits a user to connect to a private network and access all its services and resources remotely. The connection between the user and the private network occurs through the Internet and the connection is secure and private.|
|**Site to Site VPN**|A Site-to-Site VPN is also called as Router-to-Router VPN and is commonly used in the large companies. Companies or organizations, with branch offices in different locations, use Site-to-site VPN to connect the network of one office location to the network at another office location.|
|**Cloud VPN**|A Cloud VPN is a virtual private network that allows users to securely connect to a cloud-based infrastructure or service. It uses the internet as the primary transport medium to connect the remote users to the cloud-based resources.|
|**Mobile VPN**|Mobile VPN is a virtual private network that allows mobile users to securely connect to a private network, typically through a cellular network. It creates a secure and encrypted connection between the mobile device and the VPN server, protecting the data transmitted over the connection.|
|**SSL VPN**|SSL VPN (Secure Sockets Layer Virtual Private Network) is a type of VPN that uses the SSL protocol to secure the connection between the user and the VPN server. It allows remote users to securely access a private network by establishing an encrypted tunnel between the user’s device and the VPN server.|
|**PPTP (Point-to-Point Tunneling Protocol) VPN**|PPTP (Point-to-Point Tunneling Protocol) is a type of VPN that uses a simple and fast method for implementing VPNs. It creates a secure connection between two computers by encapsulating the data packets being sent between them.|
|**L2TP (Layer 2 Tunneling Protocol) VPN**|L2TP (Layer 2 Tunneling Protocol) is a type of VPN that creates a secure connection by encapsulating data packets being sent between two computers. L2TP is an extension of PPTP, it adds more security to the VPN connection by using a combination of PPTP and L2F (Layer 2 Forwarding Protocol) and it uses stronger encryption algorithm than PPTP.|
|**OpenVPN**|OpenVPN is an open-source software application that uses SSL and is highly configurable and secure. It creates a secure and encrypted connection between two computers by encapsulating the data packets being sent between them.OpenVPN can be used to access internal resources such as email, file servers, or databases.|
2 changes: 2 additions & 0 deletions docs/technologies/apache/apache-projects.md
Original file line number Diff line number Diff line change
Expand Up @@ -292,6 +292,8 @@ An easy to use, powerful, and reliable system to process and distribute data.

Apache NiFi supports powerful and scalable directed graphs of data routing, transformation, and system mediation logic.

**Apache NiFi** is an open-source data integration and automation tool that enables the automation of data flow between different systems. NiFi provides a user-friendly interface to design, control, and manage the flow of data between various sources and destinations. The tool is particularly useful in handling data from different sources, applying transformations, and routing it to different systems in real-time.

## O

- [ODE](http://ode.apache.org/)
Expand Down
Loading

0 comments on commit 4bf696f

Please sign in to comment.