<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Rofiat Abdulkareem</title>
    <description>The latest articles on DEV Community by Rofiat Abdulkareem (@rofiatabdulkareem).</description>
    <link>https://dev.to/rofiatabdulkareem</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1810594%2Fcb5db5a5-c7d3-4e3e-96cb-caac71acf26e.jpg</url>
      <title>DEV Community: Rofiat Abdulkareem</title>
      <link>https://dev.to/rofiatabdulkareem</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/rofiatabdulkareem"/>
    <language>en</language>
    <item>
      <title>Git Commands</title>
      <dc:creator>Rofiat Abdulkareem</dc:creator>
      <pubDate>Sat, 14 Sep 2024 06:20:04 +0000</pubDate>
      <link>https://dev.to/rofiatabdulkareem/git-commands-27l9</link>
      <guid>https://dev.to/rofiatabdulkareem/git-commands-27l9</guid>
      <description>&lt;p&gt;&lt;strong&gt;Git push&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The git push command is used to upload local repository content to a remote repository. &lt;/p&gt;

&lt;p&gt;It transfers commits from your local repository to a remote repository, making your changes available to others who have access to that remote repository.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;git init&lt;/strong&gt;: Initializes a new Git repository in the current directory. It creates a .git folder that tracks your project files and their changes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;git clone :&lt;/strong&gt; Creates a local copy of a remote repository using the specified URL. This command is useful for downloading an existing repository onto your machine.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;git add :&lt;/strong&gt; Stages changes (new, modified, or deleted files) for the next commit. You can specify individual files or use . to stage all changes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;git commit -m "":&lt;/strong&gt; Records changes that have been staged with a descriptive message. This command takes a snapshot of the current state of the project.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is a commit message?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A commit message is a brief text that accompanies each commit in a Git repository. It tells the reader what was done.&lt;/p&gt;

</description>
      <category>git</category>
      <category>github</category>
      <category>developer</category>
    </item>
    <item>
      <title>Creating an Azure IoT Hub</title>
      <dc:creator>Rofiat Abdulkareem</dc:creator>
      <pubDate>Mon, 19 Aug 2024 13:42:10 +0000</pubDate>
      <link>https://dev.to/rofiatabdulkareem/creating-an-azure-iot-hub-2ljm</link>
      <guid>https://dev.to/rofiatabdulkareem/creating-an-azure-iot-hub-2ljm</guid>
      <description>&lt;p&gt;&lt;strong&gt;Do you know what IoT is all about?&lt;/strong&gt;&lt;br&gt;
IoT refers to a network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity features that enable them to collect and exchange data over the internet, just like your smart watches.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is an Azure IoT Hub?&lt;/strong&gt;&lt;br&gt;
Azure IoT Hub helps you connect and manage IoT devices. It's a key tool for building IoT projects, allowing communication between your devices and your IoT application.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How do we create an Azure IoT Hub?&lt;/strong&gt;&lt;br&gt;
Step1: Log in to Azure Portal&lt;br&gt;
Go to the Azure Portal: Visit portal.azure.com and log in with your Azure account. If you don't have an account, create one for free.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4od808ak713kmik7gvln.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4od808ak713kmik7gvln.png" alt="Login page" width="707" height="660"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 2: Find IoT Hub: Use the search bar at the top, type "IoT Hub," and select it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmz3z5sfp6mjdiwe601i9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmz3z5sfp6mjdiwe601i9.png" alt="IoT Hub" width="800" height="714"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step3: Click 'Create': In the IoT Hub section, click the "Create" button.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3fdb830h3ehm40vma1e6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3fdb830h3ehm40vma1e6.png" alt="Create" width="800" height="277"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step4:Choose Subscription and Select Resource Group&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa2b82sse80e318wbmriy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa2b82sse80e318wbmriy.png" alt="Resource group" width="800" height="659"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step5: Review and Create&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffhya00xx09hjthwufog5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffhya00xx09hjthwufog5.png" alt="Review and Create" width="800" height="659"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Azure IoT Hub Created and Deployed Successfully, click on resource to check more about it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa14gzubqfx5rdnpl8pdg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa14gzubqfx5rdnpl8pdg.png" alt="Image Deployed" width="800" height="366"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thank for reading, watch out for my next post when we attach an IoT Device to our just created IoT Hub. &lt;/p&gt;

&lt;p&gt;Don't forget to like, comment and share.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>cloudcomputing</category>
      <category>iot</category>
      <category>womenintech</category>
    </item>
    <item>
      <title>Microsoft Azure Key Vaults</title>
      <dc:creator>Rofiat Abdulkareem</dc:creator>
      <pubDate>Tue, 13 Aug 2024 09:00:00 +0000</pubDate>
      <link>https://dev.to/rofiatabdulkareem/microsoft-azure-key-vaults-99b</link>
      <guid>https://dev.to/rofiatabdulkareem/microsoft-azure-key-vaults-99b</guid>
      <description>&lt;p&gt;Azure Key Vault is a cloud service that is provided by Microsoft Azure, a secure environment for storing and managing sensitive information like keys, secrets, and certificates. Think of it as a highly secure digital safe where you can store your most valuable digital assets.&lt;/p&gt;

&lt;p&gt;It offers a centralized and secure way to manage access to your critical resources, ensuring they remain protected from unauthorized access and threats.&lt;/p&gt;

&lt;p&gt;What Does Azure Key Vault Manage?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Secrets : sensitive data (passwords, API keys, connection strings) stored securely, retrieved when needed&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Keys : cryptographic keys for encryption/decryption, asymmetric (public/private) and symmetric keys &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;certificates: SSL/TLS certificates for secure communication&lt;br&gt;
Managed and stored securely&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Secrets Management: access control through fine-grained policies, Versioning of secrets&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Key Management: key creation and import Key rotation, cryptographic operations (signing, verifying, encrypting, decrypting)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Certificate Management: certificate issuance and renewal, certificate storage, certificate policies (creation, renewal, expiration)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Azure Key Vault helps you protect your applications and data from unauthorized access and threats. Whether you need to secure passwords, encrypt sensitive data, or manage SSL/TLS certificates, Azure Key Vault provides a robust and scalable solution to meet your security needs.&lt;/p&gt;

&lt;p&gt;Thank you for reading!&lt;/p&gt;

</description>
      <category>security</category>
      <category>azure</category>
      <category>microsoftcloud</category>
      <category>learning</category>
    </item>
    <item>
      <title>Having Defense In-Depth in Azure</title>
      <dc:creator>Rofiat Abdulkareem</dc:creator>
      <pubDate>Mon, 12 Aug 2024 09:00:00 +0000</pubDate>
      <link>https://dev.to/rofiatabdulkareem/having-defense-in-depth-in-azure-564g</link>
      <guid>https://dev.to/rofiatabdulkareem/having-defense-in-depth-in-azure-564g</guid>
      <description>&lt;p&gt;Imagine your online presence as a house. you will need multiple layers of defense, walls, gates, and guards. Your digital infrastructure needs similar layers of protection. This strategy, known as "defense in depth," aims to provide comprehensive security by deploying multiple defensive mechanisms at different levels, ensuring that if one layer is breached, others are there to stop or slow down an attacker.😊&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is Defense in Depth?&lt;/strong&gt;&lt;br&gt;
Defense in depth is a cybersecurity strategy that uses a series of layered defenses to protect information and resources. By implementing multiple security measures, organizations can protect against a wide range of threats and reduce the chances of a successful attack.&lt;/p&gt;

&lt;p&gt;By using a combination of preventive, detective, and responsive measures, you can create a robust security posture that safeguards your digital assets from a variety of threats which gives you peace of mind.😇&lt;/p&gt;

&lt;p&gt;Thank you for reading!&lt;/p&gt;

</description>
      <category>azure</category>
      <category>security</category>
      <category>cloudcomputing</category>
      <category>learning</category>
    </item>
    <item>
      <title>Azure Service Level Agreement (SLA)</title>
      <dc:creator>Rofiat Abdulkareem</dc:creator>
      <pubDate>Sun, 11 Aug 2024 08:00:00 +0000</pubDate>
      <link>https://dev.to/rofiatabdulkareem/azure-service-level-agreement-sla-ep5</link>
      <guid>https://dev.to/rofiatabdulkareem/azure-service-level-agreement-sla-ep5</guid>
      <description>&lt;p&gt;While signing up for Azure, you accept its SLAs which ensures you’re leveraging the cloud with confidence.&lt;/p&gt;

&lt;p&gt;Azure SLAs are more than just legal jargon. They’re commitments from Microsoft to ensure their services meet specific performance standards. Here’s a quick overview of what to look for:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Uptime Guarantees:&lt;br&gt;
Azure SLAs specify the guaranteed uptime for each service. For example, Azure Virtual Machines come with a 99.9% uptime guarantee.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Performance Metrics:&lt;br&gt;
SLAs include performance metrics that Azure promises to meet. This can include data transfer speeds, transaction processing times, and more.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Remedies for Downtime:&lt;br&gt;
If Azure fails to meet the SLA, they offer service credits as compensation. This is their way of ensuring you’re not left in the lurch if things go wrong.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Remember, Azure’s SLAs are your assurance that Microsoft is committed to delivering top-notch service. So, start your Azure journey today, and build with the confidence that your cloud foundation is rock solid.&lt;/p&gt;

&lt;p&gt;Thank you for reading!&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Securing Your Azure Resources: A Guide to Using Read-Only and Delete Locks</title>
      <dc:creator>Rofiat Abdulkareem</dc:creator>
      <pubDate>Sat, 10 Aug 2024 08:00:00 +0000</pubDate>
      <link>https://dev.to/rofiatabdulkareem/securing-your-azure-resources-a-guide-to-using-read-only-and-delete-locks-5a53</link>
      <guid>https://dev.to/rofiatabdulkareem/securing-your-azure-resources-a-guide-to-using-read-only-and-delete-locks-5a53</guid>
      <description>&lt;p&gt;Imagine you've built a magnificent sandcastle at the beach. It's intricate, detailed, and the product of hours of work. Now, you want to protect it from any accidental kicks or eager hands that might destroy it. In the world of Azure, your resources are your sandcastles, and to protect them, Azure provides two powerful tools: Read-only locks and Delete locks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Meet the Guards&lt;/strong&gt;: Read-only and Delete Locks&lt;br&gt;
In Azure, locks act as vigilant guards, ensuring your resources stay safe from unwanted changes or deletions. Here’s how each lock type works:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Read-only Lock&lt;/strong&gt;: The Guardian of Integrity
A read-only lock is like placing a "Do Not Touch" sign on your sandcastle. It prevents any changes to the resource. Users can look at the resource, examine its details, and even admire its beauty, but they can't alter or delete it.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Use Case&lt;/strong&gt;: When you have a critical resource configuration that should remain untouched. Think of it like locking down a production environment after rigorous testing.&lt;br&gt;
Behavior: Imagine setting your sandcastle in a glass display. Everyone can see it, but no one can touch or change it.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Delete Lock&lt;/strong&gt;: The Guardian of Existence
A delete lock is like placing a "No Entry" sign around your sandcastle, ensuring it can't be destroyed. Users can modify the resource and make updates, but deletion is off the table.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Use Case&lt;/strong&gt;: Perfect for resources you never want to lose accidentally, like a production database or a key virtual machine.&lt;br&gt;
Behavior: It’s like having a protective barrier around your sandcastle. Changes are allowed, but bulldozers are strictly prohibited.&lt;br&gt;
Applying Your Guards&lt;/p&gt;

&lt;p&gt;Setting up these locks in Azure is straightforward. You can apply them at various levels: &lt;strong&gt;the subscription&lt;/strong&gt;, &lt;strong&gt;resource group&lt;/strong&gt;, or &lt;strong&gt;individual resource level&lt;/strong&gt;. Here's how you can do it:&lt;/p&gt;

&lt;p&gt;Using the Azure Portal:&lt;br&gt;
Step1: Navigate to the resource, resource group, or subscription you want to lock. Here I will be using a resource group I created earlier.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgzsmvf6yuz7xuogkhe87.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgzsmvf6yuz7xuogkhe87.png" alt="Navigating to Resource Groups " width="800" height="434"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step2: In the left menu, select Locks and click Add to add a new lock&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhwg4asi23jfa2y37v3a7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhwg4asi23jfa2y37v3a7.png" alt="Click Lock" width="800" height="635"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step3: Specify the lock type (Read-only or Delete), provide a name, notes and save the lock. Here I chose Delete&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5bvdb0abolt2bslb2xx4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5bvdb0abolt2bslb2xx4.png" alt="Lock Type" width="800" height="624"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can then try to Delete the Resource Group, you will notice you cant!&lt;/p&gt;

</description>
      <category>security</category>
      <category>azure</category>
      <category>cloud</category>
      <category>cloudcomputing</category>
    </item>
    <item>
      <title>Unlocking Azure Security Policy</title>
      <dc:creator>Rofiat Abdulkareem</dc:creator>
      <pubDate>Fri, 09 Aug 2024 08:00:00 +0000</pubDate>
      <link>https://dev.to/rofiatabdulkareem/unlocking-azure-security-policy-po2</link>
      <guid>https://dev.to/rofiatabdulkareem/unlocking-azure-security-policy-po2</guid>
      <description>&lt;p&gt;&lt;strong&gt;What is a Security Policy?&lt;/strong&gt;&lt;br&gt;
A security policy in Azure Security Center is like a comprehensive security blueprint. It defines the rules and controls you need to implement to safeguard your resources. Think of it as a detailed plan for your fortress, outlining everything from entry protocols to surveillance measures.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Role of Security Policies&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Defining Security Requirements: Security policies allow you to specify your security requirements. Whether it's ensuring all your virtual machines have antivirus protection or that your databases are encrypted, these policies set the standards for your Azure resources.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Enforcing Best Practices: Azure Security Center uses these policies to check your environment against a vast array of security best practices. If anything is out of line, it alerts you and provides recommendations for remediation.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Continuous Monitoring: Once your policies are in place, Azure Security Center continuously monitors your resources. It’s like having an ever-vigilant sentinel that keeps an eye on every corner of your fortress, ensuring ongoing compliance with your security blueprint.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Azure Security Center’s security policies are your strategic blueprint for a robust and secure cloud environment. By defining, enforcing, and continuously monitoring security requirements, these policies help transform your Azure resources into a well-protected fortress.&lt;/p&gt;

&lt;p&gt;So, as you build and manage your Azure environment, let security policies be your guide, ensuring that every aspect of your digital fortress stands strong against potential threats.&lt;/p&gt;

&lt;p&gt;Thank you for reading!&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Authentication vs. Authorization in Azure: Decoding the Dynamic Duo of Security</title>
      <dc:creator>Rofiat Abdulkareem</dc:creator>
      <pubDate>Thu, 08 Aug 2024 08:00:00 +0000</pubDate>
      <link>https://dev.to/rofiatabdulkareem/authentication-vs-authorization-in-azure-decoding-the-dynamic-duo-of-security-4pnn</link>
      <guid>https://dev.to/rofiatabdulkareem/authentication-vs-authorization-in-azure-decoding-the-dynamic-duo-of-security-4pnn</guid>
      <description>&lt;p&gt;Picture this: You're about to enter an exclusive tech conference. At the entrance, there's a bouncer (let's call him Azure) who's ensuring only the right people get in and can access various areas. This bouncer performs two crucial tasks: authentication and authorization. Let's dive into how these two roles play out in the world of Azure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Gatekeeper: Authentication&lt;/strong&gt;&lt;br&gt;
Authentication is like the initial checkpoint where the bouncer checks your identity. This step ensures you are who you claim to be. Think of it as the bouncer asking for your ID. In the digital realm of Azure, this process involves verifying your username and password. But it doesn't stop there – Azure might also ask for a fingerprint, a secret code sent to your phone, or even a facial scan. This multi-factor authentication (MFA) adds an extra layer of security, just like showing both your ID and a VIP badge.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The VIP Access: Authorization&lt;/strong&gt;&lt;br&gt;
Once the bouncer confirms your identity, the next step is authorization – determining what areas you can access and what activities you can perform. It’s akin to the bouncer checking the list to see if you’re allowed into the VIP lounge, the backstage area, or just the general admission floor.&lt;/p&gt;

&lt;p&gt;In Azure, authorization defines what you can do once you're inside. Azure checks your permissions and roles, like a bouncer cross-referencing a list to see if you're a VIP guest or just a regular attendee. This is managed through Role-Based Access Control (RBAC), where roles like Reader, Contributor, or Owner determine your access rights.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Dynamic Duo: Working Together&lt;/strong&gt;&lt;br&gt;
To wrap it up, think of authentication and authorization as a dynamic duo – like Batman and Robin – each playing a vital role in keeping your Azure environment secure. Authentication verifies your identity ("Who are you?"), while authorization determines your access and permissions ("What are you allowed to do?"). You can't have one without the other – authentication always comes first, followed by authorization.&lt;/p&gt;

&lt;p&gt;So, next time you're setting up security in Azure, remember the bouncer at the tech conference, ensuring only the right people get in and can access the right areas. With robust authentication and authorization, you're well on your way to creating a secure, efficient, and well-managed cloud environment.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

</description>
      <category>security</category>
      <category>azure</category>
      <category>cloudcomputing</category>
      <category>cloudpractitioner</category>
    </item>
    <item>
      <title>What Is a Distributed Denial-of-Service attack</title>
      <dc:creator>Rofiat Abdulkareem</dc:creator>
      <pubDate>Wed, 07 Aug 2024 07:23:56 +0000</pubDate>
      <link>https://dev.to/rofiatabdulkareem/what-is-a-distributed-denial-of-service-attack-3dhj</link>
      <guid>https://dev.to/rofiatabdulkareem/what-is-a-distributed-denial-of-service-attack-3dhj</guid>
      <description>&lt;p&gt;Imagine you're running an online store, and it's Black Friday. Customers are flooding in, excited to grab the best deals. Suddenly, your website slows to a crawl and then crashes. Panic sets in as you realize you’re under attack—not by a competitor, but by an invisible enemy: a Distributed Denial-of-Service (DDoS) attack.😲&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;           **What is a DDoS Attack?**
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;A DDoS attack is like an artificial traffic jam, designed to overwhelm your online services. Instead of a single source, it involves multiple compromised systems, often dispersed across the globe, all targeting your service simultaneously. The goal is to flood your server with so much traffic that it can't handle legitimate user requests, leading to slowdowns and outages.&lt;/p&gt;

&lt;p&gt;In a world where online threats are constantly evolving, DDoS Protection ensures that your services remain available and reliable, even under attack. So, whether it's Black Friday or any other day, your business can keep running smoothly.😊&lt;/p&gt;

&lt;p&gt;By leveraging cloud services like Azure and AWS comprehensive DDoS protection, you can focus on what matters most: providing great products and services to your customers, without worrying about who is going to attack your website.&lt;/p&gt;

&lt;p&gt;Thank you for reading&lt;/p&gt;

</description>
      <category>security</category>
      <category>ddos</category>
      <category>cloud</category>
      <category>azure</category>
    </item>
    <item>
      <title>Simplify Your Workflow By Using Virtual Machine on Microsoft Azure</title>
      <dc:creator>Rofiat Abdulkareem</dc:creator>
      <pubDate>Tue, 06 Aug 2024 06:55:51 +0000</pubDate>
      <link>https://dev.to/rofiatabdulkareem/simplify-your-workflow-by-using-virtual-machine-on-microsoft-azure-4g5d</link>
      <guid>https://dev.to/rofiatabdulkareem/simplify-your-workflow-by-using-virtual-machine-on-microsoft-azure-4g5d</guid>
      <description>&lt;p&gt;In today’s tech-driven world, efficiency and flexibility are key. Virtual machines (VMs) offer a powerful way to access and manage computing resources from anywhere, and connecting to a Windows VM on Microsoft Azure can significantly streamline your workflow. Whether you're a developer, data analyst, or just a tech enthusiast, understanding how to connect to your Azure Windows VM can enhance productivity and offer new capabilities. &lt;/p&gt;

&lt;p&gt;What Can You Use Virtual Machines For?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Development and Testing&lt;/strong&gt;&lt;br&gt;
VMs provide isolated environments for development and testing. You can create multiple VMs to test different configurations, software, or operating systems without affecting your local machine.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Running Legacy Applications&lt;/strong&gt;&lt;br&gt;
If you have older applications that are not compatible with your current operating system, you can run them on a VM with an older OS.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Disaster Recovery and Backup&lt;/strong&gt;&lt;br&gt;
Use VMs for disaster recovery plans. By regularly backing up your data to a VM, you can ensure that your information is safe and can be quickly restored in case of data loss.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Training and Education&lt;/strong&gt;&lt;br&gt;
VMs are excellent for training and educational purposes. Students and trainees can work on isolated environments without risking the main system’s integrity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud Computing&lt;/strong&gt;&lt;br&gt;
VMs are a cornerstone of cloud computing. You can deploy applications and services on VMs in the cloud, providing scalability and reliability.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Remote Desktops&lt;/strong&gt;&lt;br&gt;
Use VMs as remote desktops to access your work environment from anywhere. This is particularly useful for remote work and collaboration.&lt;/p&gt;

&lt;p&gt;You can effortlessly create and deploy a Virtual Machine on Microsoft Azure and make the most out of it. For more detailed instructions and tips, check out my post &lt;a href="https://dev.to/rofiatabdulkareem/creating-a-virtual-machine-in-microsoft-azure-3d49"&gt;Creating a virtual machine&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Happy computing!&lt;/p&gt;

</description>
      <category>azure</category>
      <category>cloudcomputing</category>
      <category>vm</category>
      <category>microsoft</category>
    </item>
    <item>
      <title>Creating A Virtual Machine in Microsoft Azure</title>
      <dc:creator>Rofiat Abdulkareem</dc:creator>
      <pubDate>Mon, 29 Jul 2024 08:39:50 +0000</pubDate>
      <link>https://dev.to/rofiatabdulkareem/creating-a-virtual-machine-in-microsoft-azure-3d49</link>
      <guid>https://dev.to/rofiatabdulkareem/creating-a-virtual-machine-in-microsoft-azure-3d49</guid>
      <description>&lt;p&gt;What have you heard about Virtual Machine(VM)?&lt;br&gt;
A VM is like a computer you can create and run inside the Azure cloud. it behaves just like a physical computer with its own operating system(like windows or Linux) and software. You can use it just like your home computer but it runs in the cloud not on your desk. They can be used to run applications, for Development and Testing and so many more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to create a virtual Machine in Azure&lt;/strong&gt;&lt;br&gt;
There are different ways to create a VM in Azure but today, we will be talking about creating a virtual machine using the Azure portal.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step1:&lt;/strong&gt; log into the &lt;a href="https://portal.azure.com/" rel="noopener noreferrer"&gt;Azure portal&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faljecd8dzqekf64zvup7.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faljecd8dzqekf64zvup7.jpg" alt="log in" width="795" height="658"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step2:&lt;/strong&gt; Locate the search bar and type in 'Virtual Machine'&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe89gdz3gtp816gu48ukx.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe89gdz3gtp816gu48ukx.jpg" alt="search bar" width="" height=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step3:&lt;/strong&gt; Click on Virtual machine and create a new Azure Virtual Machine&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5kdnp08ffb8145g9vjln.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5kdnp08ffb8145g9vjln.jpg" alt="Create" width="800" height="477"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step4:&lt;/strong&gt; Create a new resource group and give your VM a name&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft0w0pg9gmra4puahwqeh.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft0w0pg9gmra4puahwqeh.jpg" alt="Resource Group" width="800" height="345"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step5:&lt;/strong&gt; Deploy by clicking "Review + Create".&lt;br&gt;
And Voila! you are done. simple right 😊&lt;/p&gt;

&lt;p&gt;NB: All other sections are populated and can be changed to your preference.&lt;/p&gt;

&lt;p&gt;Thank you for reading.&lt;/p&gt;

&lt;p&gt;You can follow me on &lt;a href="https://x.com/RofiatDEV" rel="noopener noreferrer"&gt;X&lt;/a&gt; for more contents like this.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>microsoftcloud</category>
      <category>virtualmachine</category>
      <category>aws</category>
    </item>
    <item>
      <title>Azure Fundamentals</title>
      <dc:creator>Rofiat Abdulkareem</dc:creator>
      <pubDate>Sat, 27 Jul 2024 10:10:02 +0000</pubDate>
      <link>https://dev.to/rofiatabdulkareem/azure-fundamentals-4i0h</link>
      <guid>https://dev.to/rofiatabdulkareem/azure-fundamentals-4i0h</guid>
      <description>&lt;p&gt;&lt;strong&gt;What is an Azure region?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;An Azure region is a geographical area containing one or more data centers, which are interconnected through a low-latency network. &lt;/p&gt;

&lt;p&gt;Stay with me, &lt;/p&gt;

&lt;p&gt;it's basically an area around the world where Microsoft has data centers. Think of it as a city block, but instead of houses, there are big, powerful buildings filled with servers and other techy stuff that run cloud services. They are designed to be readily available for you when you need them, they are reliable , and scalable by distributing resources across multiple data centers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;what is an Availability Zone?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;An Availability Zone is a distinct location within an Azure region. it is designed to be isolated from failures in other Availability Zones within the same region. in essence, an Availability Zone is a location in your region.&lt;/p&gt;

&lt;p&gt;Lets make an example&lt;/p&gt;

&lt;p&gt;Consider running an online store. Without Availability Zones, it’s like having all your resources in a single warehouse. If that warehouse faces an issue, your entire store could be affected. But, With Availability Zones, it’s similar to having multiple warehouses in different parts of the city. If one warehouse encounters a problem, the others can continue to operate normally, minimizing any impact on your customers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Deleting a Resource Group&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;when should I delete a resource group?&lt;br&gt;
Delete a resource group when it is no longer needed or to clean up unused resources. Its part of Azure best practices. if you do no longer need a resource that is running why not delete it to save you cost?&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>azure</category>
      <category>microsoft</category>
    </item>
  </channel>
</rss>
