AWS |
AWS Architecture Blog |
Top 10 AWS Architecture Blog posts of 2022 |
https://aws.amazon.com/blogs/architecture/top-10-aws-architecture-blog-posts-of-2022/
|
Top AWS Architecture Blog posts of As we wrap up we want to take a moment to shine a bright light on our readers who spend their time exploring our posts providing generous feedback and asking poignant questions Much appreciation goes to our Solutions Architects who work tirelessly to identify and produce what our customers need Without any further ado … |
2022-12-30 18:41:12 |
AWS |
AWS |
Manage AWS resources with Atlassian's Jira Service Management Cloud | Amazon Web Services |
https://www.youtube.com/watch?v=wZjRVXlORTY
|
Manage AWS resources with Atlassian x s Jira Service Management Cloud Amazon Web ServicesIn this video you ll see how to manage AWS resources with Atlassian s Jira Service Management Cloud Using the AWS Service Management Connector for Atlassian Jira Service Management Cloud you can provision and manage AWS resources with Jira Service Management JSM You can also view AWS Security Hub findings from JSM and resolve incidents impacting your AWS hosted applications from JSM through integration with AWS Systems Manager Incident Manager For more information on this topic please visit the resource s below Marketing page Documentation page Subscribe More AWS videos More AWS events videos ABOUT AWSAmazon Web Services AWS is the world s most comprehensive and broadly adopted cloud platform offering over fully featured services from data centers globally Millions of customers ーincluding the fastest growing startups largest enterprises and leading government agencies ーare using AWS to lower costs become more agile and innovate faster Marketplace AWSMarketplace Atlassian Jira JiraServiceManagementCloud JSM SMC ServiceManagementConnector AWSSecurityHub AWS AmazonWebServices CloudComputing |
2022-12-30 18:12:15 |
js |
JavaScriptタグが付けられた新着投稿 - Qiita |
【個人開発】ライブイベントで流れてる映像にハートとスタンプを送れるシステムを作った |
https://qiita.com/retoruto_carry/items/63f3789b139ab2ceba8c
|
retorutocarry |
2022-12-31 03:24:07 |
海外TECH |
MakeUseOf |
How to Disable Sign-Ins on Windows 10 |
https://www.makeuseof.com/windows-10-disable-sign-ins/
|
windows |
2022-12-30 18:45:15 |
海外TECH |
MakeUseOf |
The 5 Best Social Networking Platforms for Book Lovers |
https://www.makeuseof.com/social-networks-for-book-lovers/
|
loversreading |
2022-12-30 18:31:15 |
海外TECH |
MakeUseOf |
10 Ways to Open the Windows Recovery Drive Tool |
https://www.makeuseof.com/windows-recovery-drive-tool-open/
|
handy |
2022-12-30 18:15:15 |
海外TECH |
MakeUseOf |
Unable to Scan the QR Code on WhatsApp Web? Try These Fixes |
https://www.makeuseof.com/fixes-to-scan-qr-code-whatsapp-web/
|
whatsapp |
2022-12-30 18:06:15 |
海外TECH |
MakeUseOf |
How to Remove, Change, and Set Default Apps on Android |
https://www.makeuseof.com/tag/remove-change-set-default-apps-android/
|
android |
2022-12-30 18:01:14 |
海外TECH |
MakeUseOf |
The 6 Best Android Games With a Built-In Level Editor |
https://www.makeuseof.com/best-android-games-with-built-in-level-editor/
|
levels |
2022-12-30 18:01:14 |
海外TECH |
DEV Community |
Why Do We Need Authorization and Authentication? 🔑 |
https://dev.to/mariamarsh/why-do-we-need-authorization-and-authentication-13d9
|
Why Do We Need Authorization and Authentication We live in an era where digital data is becoming an increasingly valuable asset and with that comes the need for privacy and security Authorization and authentication are two essential security measures that enable us to protect our data and ensure that only authorized individuals have access to it In this article we ll discuss why we need authorization and authentication the different types of authorization and authentication methods and how they are applied in the API Tester mobile application What is Authorization and Authentication Authorization and authentication are two distinct concepts in computer security Authorization is the process of determining whether an individual has permission to access a system or resource API authorization guarantees that client requests have secure access to data This may entail verifying the identity of the request s originator and that they are authorised to view or alter the pertinent data There are many different auth models available if you re constructing an API If you re integrating a third party API the API provider will outline the necessary authorization Authentication involves verifying the identity of an individual or system to ensure that they are who they claim to be Authorization and authentication work together to provide a secure environment for protecting data ensuring that only authorized individuals can access it A question occurs How can servers identify who can access what they claim to be Authentication is used as a stamp for clients to gain access to server resources through API Types of Authorization and AuthenticationThere are several types of authorization and authentication methods that can be used to protect data The most common types are OAuth Access Token are used to authorize requests for limited access to a user s data The access token is issued to the user after they have authenticated with the service and is used to access protected resources OAuth can be more complex to implement but it provides a higher level of security and is widely supported by APIs API Key is a unique identifier that is used to authorize requests to an API It is typically used to protect sensitive data and prevent unauthorized access When performing API requests a client must supply an API key as a token The query string can contain the key HTTP Basic Authentication This type of authentication is used to protect web applications and web services It requires users to provide a username and password to access the application It is simple to implement but it is not very secure because the credentials are sent in plain text HMAC Hash based Message Authentication Code is a digital signature method made to reuse message digest algorithms like SHA and MD as well as to offer a reliable data integrity protocol mechanism HMAC has been chosen as a required security implementation for the internet protocol or IP since it is used to encrypt plain text securely in the Secure Socket Layer protocol and SSL certificate User Authentication This is the most basic form of authentication where users must provide a username and password to access a system or resource This type of authentication is typically used to protect web applications online accounts and other sensitive data OAuth and is a way for a client application to access data from a third party API such as a service provider on behalf of a user This allows the user to grant the client application access to their data without having to share their login credentials such as their username and password To do this the client application first needs to obtain an access token from the API This access token is then used to authenticate future requests made by the client application to the API Authorization code grant type is used when the client application cannot securely store the client secret or when the authorization code will be exchanged for an access token on a different device or system than the one that originally made the request AWS Signature is a way of authenticating requests made to Amazon Web Services AWS APIs It is used to ensure that requests made to AWS APIs are authorized and authenticated and that the request can be traced back to the user who made it How Authorization and Authentication Work in the API Tester AppThe API Tester mobile application is an easy to use free tool for testing and debugging APIs It supports any type of API including REST GraphQL WebSocket SOAP JSON RPC XML HTTP HTTPS You can enter Auth details in the request setting tab The data in the API that is required for Auth can be in the header and body The API tester can automatically detect and respond back with the chosen type of method Variables and collections are used to determine Auth with safety and security API Tester mobile app provides a secure environment for testing APIs and includes several authentication methods to help protect sensitive data User Authentication OAuth Access Token API Key HTTP Basic Authentication How to Test Authentication and Authorization using API Tester App For the explanation of Authentication let s use the GitHub API to get users information It provides us with real time data First you need to click on “Create new request or the the button in the top right corner to start a Graph QL request You can easily see the Graph QL option in the new tab under Other features Clicking on it will take you to further options On the next screen you can see an untitled GraphQL request You need to provide the API URL and paste it into the section starting with HTTPS In our case this URL will be used The Github API requires authentication In the Headers sections you can see the OAuth option so you need to provide the access token here Let me show you how to generate an Authentication token just follow these steps Log in to your GitHub account and go to the Settings page On the Settings page click on the Developer Settings tab Under the Personal access tokens section click on generate new token classic In the Note field enter a name for your token e g My token This will help you remember what the token is for Select the scope s for your token The scope determines what the token is allowed to access You can select one or more of the available options depending on your needs Click on the Generate token button to create the token Copy the token to your clipboard It will not be shown again so make sure to save it in a secure location That s it You can now use the personal access token to authenticate with the GitHub API or to perform actions on your account using the command line Keep in mind that personal access tokens are like passwords so you should treat them with the same level of security Now we have to go to the Body section and specify a query to get your specific type of data For example let s get the id information of a Github account So the corresponding Query using the Github login is written in the body tab as you can see in the screenshot below user login mariamarshmallow login id After the Authentication Github will send a Response code that will have information about the user username and id The scope of the token you have given access to is known as Authorization Basic AuthenticationBasic authentication is often used in conjunction with the HTTP protocol which is the foundation of the World Wide Web When a client makes a request to a server the server sends back a response that includes a header field containing an authentication challenge The client then sends a second request that includes a header field containing the user name and password encoded in base The server checks the credentials and if they are valid sends back a response containing the requested resources To test basic authentication let s use the Postman API with this URL This is an open API that uses “username and “password Open the API Tester app create a new GET Request and paste the URL above Next in the Auth section enter the username and password of the API for authentication Once you click on the blue play button you can see the response screen with the response code “Authenticated If you do not enter authentication details on the response page a message appears with the response code of “Restricted This is how we can test API with basic Authentication using the API Tester mobile App API Key AuthenticationIt is a way for the server to recognize and authorize the client to access the API resources To use API key authentication the client must send the API key in the request header or as a query parameter The server will then validate the API key and if it is valid allow the client to access the API resources Sign up for an API key from the API provider In your API request add the API key as a query parameter or in the request header Make the API request using the API Tester app The server will validate the API key and if it is valid allow the client to access the API resources Here is an example of how to use API key authentication in a GET request using the API Tester app Create a new GET Request and enter the API URL in the request box e g In the Query section add the limit parameter and the API key parameter e g limit amp api key YOUR API KEY Click the Play button to send the request If the API key is valid you will receive a response with the requested information It is important to keep your API key secret and secure as it allows access to the API resources Make sure to use it only in trusted environments and do not share it with others ConclusionAuthorization and authentication are crucial security measures that allow us to protect our data and ensure that only authorized individuals have access to it In this article we discussed why we need authorization and authentication the different types of authorization and authentication methods and how they are applied in the API Tester mobile application By implementing effective authorization and authentication measures we can safeguard our data and prevent unauthorized access It is important to regularly review and update our security measures to ensure that they remain effective and protect our data from potential threats |
2022-12-30 18:43:35 |
海外TECH |
DEV Community |
Asymmetric encryption |
https://dev.to/niza/asymmetric-encryption-55np
|
Asymmetric encryptionAsymmetric encryption is a method of encrypting data so that the encryption and decryption keys are different This means the key used to encrypt the data is not the same as the key used to decrypt it In asymmetric encryption there are two keys a public key and a private key The public key is used to encrypt the data while the private key decrypts it The public key can be shared with anyone while the private key should be kept secret One of the main benefits of asymmetric encryption is that it allows for secure communication between two parties without needing to exchange a shared secret key beforehand This makes it useful for secure communication over the internet and other untrusted networks There are many different algorithms that can be used for asymmetric encryption including RSA ElGamal and Diffie Hellman These algorithms use complex mathematical operations to generate public and private keys and they are designed to be challenging to crack even with advanced computing power JavaScript libraries that provide support for asymmetric encryptioncrypto js node rsa jsrsasign jsencrypt PHP libraries that provide support for asymmetric encryptionOpenSSL phpseclib Sodium Python libraries that provide support for asymmetric encryptionpycryptodome pycrypto cryptography Asymmetric encryption has various applications including secure communication between two parties digital signatures to verify the authenticity of messages secure login systems secure key exchange and secure file transfer secure API It is a powerful tool for protecting data and communication in many different contexts such as online banking e commerce and secure messaging Asymmetric encryption uses a public key to encrypt data which can only be decrypted using a private key ensuring that only the intended recipient can access the data |
2022-12-30 18:35:13 |
海外TECH |
DEV Community |
UI Automation Testing Demo Site |
https://dev.to/mdmoeenajazkhan/ui-automation-testing-demo-site-4gid
|
UI Automation Testing Demo SiteWhile learning Web UI testing we are always searching for Demo sites that try to mimic real world scenarios Over time several people in the community have developed these sites with different features and provided good resources and documentation about each usage In this article I will be listing out all the good resources which you can make use of and if you find I have missed anything then please comment and I will update the list Automation Book Store Automation Test Store DemoBlaze DemoQA ParaBank LetCode SelectorHub Selenium Test Pages Swag Labs The Internet UI Test Automation Playground XYZ Bank login What Do You Think Did this work for you Could I have done something better Have I missed something Please share your thoughts and let me know if there are particular things that you would enjoy reading further Cheers |
2022-12-30 18:19:59 |
Apple |
AppleInsider - Frontpage News |
Tim Cook talked App Store laws & user privacy with Japan's PM |
https://appleinsider.com/articles/22/12/30/tim-cook-talked-app-store-laws-user-privacy-with-japans-pm?utm_medium=rss
|
Tim Cook talked App Store laws amp user privacy with Japan x s PMOn his Pacific rim tour Apple CEO Tim Cook asked the Japanese Prime Minister to think about user protections if the country decides to legislate the distribution of smartphone apps Tim Cook touring a Sony facility in December Twitter Tim Cook Following a decision by Europe to force Apple and other device makers to enable third party app marketplaces on their hardware Tim Cook has been keen to ease future issues the App Store may face In his December trip to Japan he appealed to the highest politician in the country Read more |
2022-12-30 18:51:49 |
海外科学 |
NYT > Science |
How Bad Is China’s Covid Outbreak? It’s a Scientific Guessing Game. |
https://www.nytimes.com/2022/12/29/health/china-covid-outbreak-predictions.html
|
How Bad Is China s Covid Outbreak It s a Scientific Guessing Game In the absence of credible information from the Chinese government researchers around the world are looking for any clues to determine the size and severity of the surge |
2022-12-30 18:34:14 |
ニュース |
BBC News - Home |
UK set to require negative Covid test for China arrivals |
https://www.bbc.co.uk/news/uk-64130655?at_medium=RSS&at_campaign=KARANGA
|
chinese |
2022-12-30 18:51:46 |
ニュース |
BBC News - Home |
Police arrest suspect in murder of four Idaho university students |
https://www.bbc.co.uk/news/world-us-canada-64130503?at_medium=RSS&at_campaign=KARANGA
|
studentsthe |
2022-12-30 18:46:01 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
「新年の目標を必ず叶える人」のたった1つの特徴 - 99%はバイアス |
https://diamond.jp/articles/-/314801
|
突破 |
2022-12-31 03:50:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
【出口学長・日本人が最も苦手とする哲学と宗教特別講義】 「人工国家」アメリカがよ~くわかる必読の一冊 - 哲学と宗教全史 |
https://diamond.jp/articles/-/313451
|
|
2022-12-31 03:45:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
「座りっぱなしの人」の人は要注意!「体のゆがみ」を発見する、整体プロのセルフ診断法 - すごい自力整体 |
https://diamond.jp/articles/-/315332
|
「座りっぱなしの人」の人は要注意「体のゆがみ」を発見する、整体プロのセルフ診断法すごい自力整体年齢とともに、ますます硬くなる体、痛くて上がらない肩、腰や股関節、ひざの痛み、体のゆがみ、むくみ……。 |
2022-12-31 03:40:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
【名著から学ぶ】日本風土における経済学の限界 - 【新装版】危機の構造 日本社会崩壊のモデル |
https://diamond.jp/articles/-/315457
|
『【新装版】危機の構造日本社会崩壊のモデル』では、社会学者・橋爪大三郎氏による解説に加え、年に発刊された【増補版】に掲載された「私の新戦争論」も収録されている。 |
2022-12-31 03:30:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
トランプ氏納税記録、下院が詳細公開 - WSJ発 |
https://diamond.jp/articles/-/315535
|
詳細 |
2022-12-31 03:25:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
【コミュ力おばけの芸人はこうする!】難しい質問をされたときの対処法とは? - 1秒で答えをつくる力 お笑い芸人が学ぶ「切り返し」のプロになる48の技術 |
https://diamond.jp/articles/-/315470
|
|
2022-12-31 03:25:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
受験前に最低限知っておきたい【超・速算法2選】 - 小学生がたった1日で19×19までかんぺきに暗算できる本 |
https://diamond.jp/articles/-/314954
|
速算 |
2022-12-31 03:20:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
【ウケる会話のコツ】友達をイジるとき、どうすればウケる? - おもろい話し方 |
https://diamond.jp/articles/-/315298
|
高い |
2022-12-31 03:15:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
「営業未経験でも売れる人」と「ベテラン営業なのに売れない人」のたった1点の違い - コピーライティング技術大全 |
https://diamond.jp/articles/-/314469
|
「営業未経験でも売れる人」と「ベテラン営業なのに売れない人」のたった点の違いコピーライティング技術大全神田昌典氏年の集大成『コピーライティング技術大全ー百年売れ続ける言葉の原則』コピ全が話題だ。 |
2022-12-31 03:10:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
【マネー緊急対談】顧客からの「ありがとう」が売上や利益となり、投資のリターンになる - 最新版つみたてNISAはこの9本から選びなさい |
https://diamond.jp/articles/-/314699
|
|
2022-12-31 03:05:00 |
ビジネス |
ダイヤモンド・オンライン - 新着記事 |
相手に悪気がなくても、事情があっても決して許さなくていい「たった1つの理由」【予約の取れないカウンセラーが教える】 - あなたはもう、自分のために生きていい |
https://diamond.jp/articles/-/315192
|
twitter |
2022-12-31 03:03:00 |
コメント
コメントを投稿