Skip to content

Cloud Invent

Cloud Security, DevOps, and Online Marketing Blog

  • Home
  • Devops
  • About
January 30, 2023 Yuli Stremovsky

Researching competitors without breaking into Google Analytics

Competitor research is a vital part of SEO (Search Engine Optimization) as it allows you to understand the strategies and tactics your competitors are using to achieve success in the

Continue reading
Payment tech: Building Mobile vs Web wallet
August 2, 2020 Yuli Stremovsky

Payment tech: Building Mobile vs Web wallet

Being an ex. founder of a multi-signature Bitcoin mobile wallet both for Android and IOS (at Kesem.io) and a web developer in the past, I decided to summarize what are

Continue reading
Hack to set up SSL certificate in AWS Marketplace CloudFormation template
March 31, 2020 Yuli Stremovsky

Hack to set up SSL certificate in AWS Marketplace CloudFormation template

This method can be used to deploy a standard (not a self-signed) certificate for your product web management or for your API service deployed using CloudFormation template.

Continue reading
Privacy Wild West is over, deploy Databunker
December 19, 2019 Yuli Stremovsky

Privacy Wild West is over, deploy Databunker

Today, I would like to announce the availability of the project I was working in my spare time. It is a one-stop-shop solution for any startup that wishes to comply

Continue reading
Speedup MySQL inserts
September 18, 2019 Yuli Stremovsky

Backdoor webserver using MySQL SQL Injection

MySQL Database is a great product used by thousands of websites. Various web applications use MySQL as their default database. Some of these applications are written with security in mind,

Continue reading
Harvesting LinkedIn data for fun & profit
September 10, 2019 Yuli Stremovsky

Harvesting LinkedIn data for fun & profit

A few years ago, before the GDPR era, I was involved in a stealth marketing startup. We went out of business without getting funding. During my work on the start-up,

Continue reading
Codeseek.com - search engine for developers
August 24, 2019 Yuli Stremovsky

Codeseek.com – search engine for developers

I used to be a software developer in the past. Sometimes, even today, doing mostly cloud security, I need to dig deeper into the code. Most of the time I

Continue reading
Fix curl SSL certificate problem
August 22, 2019 Yuli Stremovsky

Fix curl SSL certificate problem

When using curl, from PHP, from time to time, I had to use some 3rd party API services. Today I would like to deep dive into common error when trying

Continue reading
OWASP Global AppSec DC 2019
August 20, 2019 Yuli Stremovsky

OWASP Global AppSec DC 2019

Hello. For all my US readers, I have great news for you. In case you are going to attend OWASP Global AppSec DC September 12-13 in Washington, DC, it is

Continue reading
Step by step Hashicorp Vault CA/PKI deployment
August 16, 2019 Yuli Stremovsky

Step by step Hashicorp Vault CA/PKI deployment

I love to work with Hashicorp Vault in the cloud projects. It is a great solution for companies that do not want to lock themselves to Google or AWS cloud.

Continue reading
Secure Docker networking in AWS/AZURE
August 14, 2019 Yuli Stremovsky

Secure Docker networking in AWS/AZURE

Today I had to add another security brick to the project I am working on – limit access from Docker containers to sensitive resources: block access to AWS and Azure

Continue reading
Stellar coin - calculate size of buckets/ directory
August 8, 2019 Yuli Stremovsky

Stellar coin – calculate size of buckets/ directory

Stellar digital currency fascinates me a lot. I do not consider it as a true blockchain as Bitcoins, but more as a distributed database for transactions. I think it is

Continue reading
How to do AssumeRole in Azure
August 7, 2019 Yuli Stremovsky

How to do AssumeRole in Azure

Today I would like to give you a solution that will allow you to control one Azure account from another. Let’s start from the basics. AWS AssumeRole is used for

Continue reading
Cloud security checklist
May 5, 2019 Yuli Stremovsky

Cloud security checklist

Here is a partial list of security activities to perform to raise your project security level. 1. Basic container – use a very simple base container with a minimal number

Continue reading
Stop selling me developer hours, sell me results
February 26, 2019 Yuli Stremovsky

Stop selling me developer hours, sell me results

Start selling me results. I am not going to Ukraine or Belarus or Romania or Russia to manage developers locally. I am ready to buy results only. As a CTO

Continue reading
Copy app binary file using adb shell
December 16, 2018 Yuli Stremovsky

Copy app binary file using adb shell

Sometimes it is very useful to copy binary file from Android back to host OS. For example you can copy application database. I used the following method to copy binary

Continue reading
Adding custom data to bitcoin transaction
December 9, 2018 Yuli Stremovsky

Adding custom data to bitcoin transaction

As you probably know, most of the people talk about Bitcoin blockchain as to distributed ledger, meaning it is a distributed database of transactions. The are some ways that allow

Continue reading
Modern approach to monolithic software design
April 2, 2018 Yuli Stremovsky

Modern approach to monolithic software design

I used to like monolithic software design. I build code that was using in-memory databases and can sustain pretty heavy load. In one project that I was a R&D manager

Continue reading
Hello World from #NET docker container in Linux
April 1, 2018 Yuli Stremovsky

Hello World from #NET docker container in Linux

As developers are moving to containerize software deployment mostly running on Linux servers, Microsoft does not want to stand behind. Microsoft has officially released docker containers to run asp.net and

Continue reading
Checkpoint R80.10: dump firewall rules from remote
September 18, 2017 Yuli Stremovsky

Checkpoint R80.10: dump firewall rules from remote

One of the core concepts of computer and network security is multi-layer security protection. In simple words it means, to be safe, you need to add more protection layers. A

Continue reading

Posts navigation

1 2 Next Posts»
WordPress Theme: Wellington by ThemeZee.